all InfoSec news
Topic: functions
Python Trojan Functions and Imports
30 minutes ago |
blog.phylum.io
Exponential Quantum One-Wayness and EFI Pairs
1 day, 14 hours ago |
arxiv.org
Generic MitM Attack Frameworks on Sponge Constructions
2 days, 16 hours ago |
www.iacr.org
Bitcoin ‘Halving’ Cuts Supply of New Tokens in Threat to Miners
4 days, 18 hours ago |
bloomberg.com
Akira takes in $42 million in ransom payments, now targets Linux servers
4 days, 23 hours ago |
malware.news
What is Encryption in Malware? – Understand From Basics to XOR
6 days, 9 hours ago |
gbhackers.com
On the Optimal Regret of Locally Private Linear Contextual Bandit
1 week, 1 day ago |
arxiv.org
Crooked indifferentiability of the Feistel Construction
1 week, 1 day ago |
arxiv.org
Facebook Introduces Meta AI in WhatsApp
1 week, 2 days ago |
dev.to
How much of your jobs are trusting without verifying?
1 week, 4 days ago |
www.reddit.com
The Hidden Economy of Open Source Software
1 week, 5 days ago |
malware.news
On the Direct Construction of MDS and Near-MDS Matrices
2 weeks, 1 day ago |
arxiv.org
Protecting art and passwords with biochemistry
2 weeks, 2 days ago |
techxplore.com
Highly-Effective Backdoors for Hash Functions and Beyond
2 weeks, 4 days ago |
www.iacr.org
How the NIST CSF 2.0 Can Help Healthcare Sector Firms
3 weeks, 2 days ago |
www.databreachtoday.co.uk
How the NIST CSF 2.0 Can Help Healthcare Sector Firms
3 weeks, 2 days ago |
www.govinfosecurity.com
How the NIST CSF 2.0 Can Help Healthcare Sector Firms
3 weeks, 2 days ago |
www.bankinfosecurity.com
Day 12 of 30-Day .NET Challenge: Azure Functions
3 weeks, 3 days ago |
dev.to
Malicious npm Package Caught Hijacking ERC20 Contracts to Drain USDT
3 weeks, 4 days ago |
blog.phylum.io
What would happen if SHA256 or MD5 broke down in one day ?
3 weeks, 5 days ago |
www.reddit.com
What are the Benefits of CloudLinux?
3 weeks, 6 days ago |
dev.to
Generic MitM Attack Frameworks on Sponge Constructions
2 days, 16 hours ago |
www.iacr.org
Bitcoin ‘Halving’ Cuts Supply of New Tokens in Threat to Miners
4 days, 18 hours ago |
bloomberg.com
Akira takes in $42 million in ransom payments, now targets Linux servers
4 days, 23 hours ago |
malware.news
Exponential Quantum One-Wayness and EFI Pairs
1 day, 14 hours ago |
arxiv.org
What is Encryption in Malware? – Understand From Basics to XOR
6 days, 9 hours ago |
gbhackers.com
Python Trojan Functions and Imports
30 minutes ago |
blog.phylum.io
Items published with this topic over the last 90 days.
Latest
Python Trojan Functions and Imports
30 minutes ago |
blog.phylum.io
Exponential Quantum One-Wayness and EFI Pairs
1 day, 14 hours ago |
arxiv.org
Generic MitM Attack Frameworks on Sponge Constructions
2 days, 16 hours ago |
www.iacr.org
Bitcoin ‘Halving’ Cuts Supply of New Tokens in Threat to Miners
4 days, 18 hours ago |
bloomberg.com
Akira takes in $42 million in ransom payments, now targets Linux servers
4 days, 23 hours ago |
malware.news
What is Encryption in Malware? – Understand From Basics to XOR
6 days, 9 hours ago |
gbhackers.com
On the Optimal Regret of Locally Private Linear Contextual Bandit
1 week, 1 day ago |
arxiv.org
Crooked indifferentiability of the Feistel Construction
1 week, 1 day ago |
arxiv.org
Facebook Introduces Meta AI in WhatsApp
1 week, 2 days ago |
dev.to
How much of your jobs are trusting without verifying?
1 week, 4 days ago |
www.reddit.com
The Hidden Economy of Open Source Software
1 week, 5 days ago |
malware.news
On the Direct Construction of MDS and Near-MDS Matrices
2 weeks, 1 day ago |
arxiv.org
Protecting art and passwords with biochemistry
2 weeks, 2 days ago |
techxplore.com
Highly-Effective Backdoors for Hash Functions and Beyond
2 weeks, 4 days ago |
www.iacr.org
How the NIST CSF 2.0 Can Help Healthcare Sector Firms
3 weeks, 2 days ago |
www.databreachtoday.co.uk
How the NIST CSF 2.0 Can Help Healthcare Sector Firms
3 weeks, 2 days ago |
www.govinfosecurity.com
How the NIST CSF 2.0 Can Help Healthcare Sector Firms
3 weeks, 2 days ago |
www.bankinfosecurity.com
Day 12 of 30-Day .NET Challenge: Azure Functions
3 weeks, 3 days ago |
dev.to
Malicious npm Package Caught Hijacking ERC20 Contracts to Drain USDT
3 weeks, 4 days ago |
blog.phylum.io
What would happen if SHA256 or MD5 broke down in one day ?
3 weeks, 5 days ago |
www.reddit.com
What are the Benefits of CloudLinux?
3 weeks, 6 days ago |
dev.to
Topic trend (last 90 days)
Top (last 7 days)
Generic MitM Attack Frameworks on Sponge Constructions
2 days, 16 hours ago |
www.iacr.org
Bitcoin ‘Halving’ Cuts Supply of New Tokens in Threat to Miners
4 days, 18 hours ago |
bloomberg.com
Akira takes in $42 million in ransom payments, now targets Linux servers
4 days, 23 hours ago |
malware.news
Exponential Quantum One-Wayness and EFI Pairs
1 day, 14 hours ago |
arxiv.org
What is Encryption in Malware? – Understand From Basics to XOR
6 days, 9 hours ago |
gbhackers.com
Python Trojan Functions and Imports
30 minutes ago |
blog.phylum.io
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Senior Security Specialist
@ Lely | Maassluis, Netherlands
IT Security Manager (Corporate Security) (REF822R)
@ Deutsche Telekom IT Solutions | Budapest, Hungary
Senior Security Architect
@ Cassa Centrale Banca - Credito Cooperativo Italiano | Trento, IT, 38122
Senior DevSecOps Engineer
@ Raft | Las Vegas, NV (Remote)
Product Manager - Compliance
@ Arctic Wolf | Remote - Colorado