all InfoSec news
Topic: report
Anonymous Complaint Aggregation for Secure Messaging
1 day, 7 hours ago |
www.iacr.org
The Systemic Errors of Banded Quantum Fourier Transformation
1 day, 7 hours ago |
www.iacr.org
Modeling Mobile Crash in Byzantine Consensus
1 day, 7 hours ago |
www.iacr.org
ISC StormCast for Monday, March 18th, 2024
1 day, 8 hours ago |
isc.sans.edu
Forensics???
3 days, 8 hours ago |
www.reddit.com
A trust-minimized e-cash for cryptocurrencies
3 days, 21 hours ago |
www.iacr.org
FBI IC3 Report Highlights BEC, Ransomware
3 days, 22 hours ago |
www.digitalshadows.com
Magnet Forensics Shares 2024 State Of Enterprise DFIR Report
3 days, 22 hours ago |
www.forensicfocus.com
Malware analysis report: Smoke Loader
4 days, 2 hours ago |
malware.news
Key MITRE ATT&CK techniques used by cyber attackers
4 days, 4 hours ago |
www.helpnetsecurity.com
The cool and the cruel: separating hard parts of LWE secrets
4 days, 8 hours ago |
www.iacr.org
Cryptanalysis of rank-2 module-LIP in Totally Real Number Fields
4 days, 8 hours ago |
www.iacr.org
Unbiasable Verifiable Random Functions
4 days, 8 hours ago |
www.iacr.org
Parameter-Hiding Order-Revealing Encryption without Pairings
4 days, 8 hours ago |
www.iacr.org
SoK: Zero-Knowledge Range Proofs
4 days, 8 hours ago |
www.iacr.org
SNOW-SCA: ML-assisted Side-Channel Attack on SNOW-V
4 days, 8 hours ago |
www.iacr.org
Key MITRE ATT&CK techniques used by cyber attackers
4 days, 4 hours ago |
www.helpnetsecurity.com
Inside the 2024 Threat Detection Report
5 days, 20 hours ago |
redcanary.com
Forensics???
3 days, 8 hours ago |
www.reddit.com
The State of Stalkerware in 2023–2024
6 days, 2 hours ago |
malware.news
Malware analysis report: Smoke Loader
4 days, 2 hours ago |
malware.news
The 2024 Sophos Threat Report: Cybercrime on Main Street
6 days, 23 hours ago |
malware.news
A trust-minimized e-cash for cryptocurrencies
3 days, 21 hours ago |
www.iacr.org
Anonymous Complaint Aggregation for Secure Messaging
1 day, 7 hours ago |
www.iacr.org
CISO Takeaways: Sysdig’s 2024 Cloud-Native Security and Usage Report
5 days, 19 hours ago |
malware.news
The cool and the cruel: separating hard parts of LWE secrets
4 days, 8 hours ago |
www.iacr.org
Cryptanalysis of rank-2 module-LIP in Totally Real Number Fields
4 days, 8 hours ago |
www.iacr.org
Unbiasable Verifiable Random Functions
4 days, 8 hours ago |
www.iacr.org
Parameter-Hiding Order-Revealing Encryption without Pairings
4 days, 8 hours ago |
www.iacr.org
Chinese Cybercrime: Discretion Is the Better Part of Valor
5 days, 12 hours ago |
www.govinfosecurity.com
SoK: Zero-Knowledge Range Proofs
4 days, 8 hours ago |
www.iacr.org
The Systemic Errors of Banded Quantum Fourier Transformation
1 day, 7 hours ago |
www.iacr.org
Modeling Mobile Crash in Byzantine Consensus
1 day, 7 hours ago |
www.iacr.org
Chinese Cybercrime: Discretion Is the Better Part of Valor
5 days, 12 hours ago |
www.databreachtoday.co.uk
Items published with this topic over the last 90 days.
Latest
Anonymous Complaint Aggregation for Secure Messaging
1 day, 7 hours ago |
www.iacr.org
The Systemic Errors of Banded Quantum Fourier Transformation
1 day, 7 hours ago |
www.iacr.org
Modeling Mobile Crash in Byzantine Consensus
1 day, 7 hours ago |
www.iacr.org
ISC StormCast for Monday, March 18th, 2024
1 day, 8 hours ago |
isc.sans.edu
Forensics???
3 days, 8 hours ago |
www.reddit.com
A trust-minimized e-cash for cryptocurrencies
3 days, 21 hours ago |
www.iacr.org
FBI IC3 Report Highlights BEC, Ransomware
3 days, 22 hours ago |
www.digitalshadows.com
Magnet Forensics Shares 2024 State Of Enterprise DFIR Report
3 days, 22 hours ago |
www.forensicfocus.com
Malware analysis report: Smoke Loader
4 days, 2 hours ago |
malware.news
Key MITRE ATT&CK techniques used by cyber attackers
4 days, 4 hours ago |
www.helpnetsecurity.com
The cool and the cruel: separating hard parts of LWE secrets
4 days, 8 hours ago |
www.iacr.org
Cryptanalysis of rank-2 module-LIP in Totally Real Number Fields
4 days, 8 hours ago |
www.iacr.org
Unbiasable Verifiable Random Functions
4 days, 8 hours ago |
www.iacr.org
Parameter-Hiding Order-Revealing Encryption without Pairings
4 days, 8 hours ago |
www.iacr.org
SoK: Zero-Knowledge Range Proofs
4 days, 8 hours ago |
www.iacr.org
SNOW-SCA: ML-assisted Side-Channel Attack on SNOW-V
4 days, 8 hours ago |
www.iacr.org
Topic trend (last 90 days)
Top (last 7 days)
Key MITRE ATT&CK techniques used by cyber attackers
4 days, 4 hours ago |
www.helpnetsecurity.com
Inside the 2024 Threat Detection Report
5 days, 20 hours ago |
redcanary.com
Forensics???
3 days, 8 hours ago |
www.reddit.com
The State of Stalkerware in 2023–2024
6 days, 2 hours ago |
malware.news
Malware analysis report: Smoke Loader
4 days, 2 hours ago |
malware.news
The 2024 Sophos Threat Report: Cybercrime on Main Street
6 days, 23 hours ago |
malware.news
A trust-minimized e-cash for cryptocurrencies
3 days, 21 hours ago |
www.iacr.org
Anonymous Complaint Aggregation for Secure Messaging
1 day, 7 hours ago |
www.iacr.org
CISO Takeaways: Sysdig’s 2024 Cloud-Native Security and Usage Report
5 days, 19 hours ago |
malware.news
The cool and the cruel: separating hard parts of LWE secrets
4 days, 8 hours ago |
www.iacr.org
Cryptanalysis of rank-2 module-LIP in Totally Real Number Fields
4 days, 8 hours ago |
www.iacr.org
Unbiasable Verifiable Random Functions
4 days, 8 hours ago |
www.iacr.org
Parameter-Hiding Order-Revealing Encryption without Pairings
4 days, 8 hours ago |
www.iacr.org
Chinese Cybercrime: Discretion Is the Better Part of Valor
5 days, 12 hours ago |
www.govinfosecurity.com
SoK: Zero-Knowledge Range Proofs
4 days, 8 hours ago |
www.iacr.org
The Systemic Errors of Banded Quantum Fourier Transformation
1 day, 7 hours ago |
www.iacr.org
Modeling Mobile Crash in Byzantine Consensus
1 day, 7 hours ago |
www.iacr.org
Chinese Cybercrime: Discretion Is the Better Part of Valor
5 days, 12 hours ago |
www.databreachtoday.co.uk
Jobs in InfoSec / Cybersecurity
Azure Security Architect
@ First Quality | Remote US - Eastern or Central Timezone
Cyber Security Principal Consultant
@ Capco | New York City
Information Security Engineers
@ D. E. Shaw Research | New York City
Information Security Engineer
@ Eurofins | Katowice, Poland
Senior Staff Security Engineering Lead
@ ServiceNow | Atlanta, Georgia, United States
Information Security Advisor (Account Security and complance leader)
@ Kyndryl | Madrid HQ (KES51610)