Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore new variants, defenses, and challenges of HTTP Request Smuggling, an attack technique exploiting interpretations of non-standard HTTP requests between client and server.
Explore how software engineering principles can enhance security practices, featuring insights from a role-reversal experiment between security and runtime teams.
Exposición sobre vulnerabilidades crÃticas Ripple20 que afectan a millones de dispositivos IoT en diversos sectores, detallando su descubrimiento, impacto y explotación técnica.
Explore Android Bluetooth vulnerabilities, including BlueRepli, and learn stealthy access techniques. Discover security risks in AOSP and mobile manufacturers' oversights.
Explore novel web cache poisoning techniques, probing cache inconsistencies to build sophisticated exploit chains. Learn to uncover vulnerabilities in caching systems across the internet.
Investigate and defend Office 365 against sophisticated attacks. Learn authentication types, attack lifecycle, and effective countermeasures for cloud-based enterprise security.
Explore IMP4GT attacks in 4G networks, revealing vulnerabilities in LTE security. Learn about impersonation techniques, their impact, and consequences for users and law enforcement.
Explore a framework for assessing and improving human-related cybersecurity vulnerabilities, focusing on evaluating and enhancing the human factor in security systems.
Explore Windows rootkit development, from basic drivers to advanced hooking techniques. Learn about kernel-mode malware, network stack manipulation, and innovative methods to evade detection.
Explore macOS-specific Office macro attacks, their growing popularity, and unique exploit techniques. Learn about analysis, sandbox bypassing, and detection methods for these emerging threats.
Explore novel anti-forensic techniques for hiding malicious process memory, evading detection by memory analysis tools while maintaining accessibility for malware functionality.
Explore Mercedes-Benz car security research, from hardware analysis to gaining control. Learn about attack surfaces, reverse engineering, and cloud control in modern connected vehicles.
Discover Plundervolt: a software-based fault attack that threatens system security without physical access. Learn its mechanisms, potential impacts, and how it compares to Rowhammer.
Explore deep-learning techniques to identify and reduce side-channel attack vulnerabilities, leveraging AI explainability for efficient implementation assessment and improved security.
Explore Samsung baseband security through emulation, enabling scalable vulnerability research and debugging for cellular network protocols.
Get personalized course recommendations, track subjects and courses with reminders, and more.