Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Data Analysis
Digital Marketing
El rol de la digitalización en la transición energética
First Step Korean
Supporting Successful Learning in Primary School
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Rattle, an innovative framework for analyzing Ethereum smart contracts, enhancing auditability and security in blockchain interactions through advanced binary analysis techniques.
Explore advanced techniques to bypass security measures and enhance Metasploit x86 shellcode, incorporating automation for improved effectiveness in various deployment scenarios.
Unveiling new vulnerabilities in SMM of Coreboot and UEFI systems, exploring impacts, and discussing mitigation techniques. Includes release of CHIPSEC module for automatic detection.
Explore legacy cryptography vulnerabilities and the crack.sh API for breaking DES-based protocols, with insights from David Hulton's research on widely used services still relying on outdated encryption.
Explore iPhone's wireless capabilities after shutdown, including Find My and Digital Car Key. Learn about potential security risks and firmware modifications for low-power Bluetooth malware.
Análisis detallado de la máquina virtual multicapa Wslink, explorando técnicas de ofuscación avanzadas y presentando un enfoque semiautomático para desobfuscar el malware de forma eficiente.
Unveiling "Branch History Injection": A new attack bypassing hardware defenses against Spectre-v2. Explore reverse engineering, exploit development, and the latest mitigations in CPU security.
Explore exception handling mechanics, from throw to catch, uncovering runtime interactions, DWARF unwinding, and LSDA. Introduces a Binary Ninja plugin for extracting exception info from binaries.
Detailed analysis of Wslink loader's advanced virtual machine obfuscator, exploring its techniques and demonstrating a semiautomatic deobfuscation approach using symbolic execution and concrete value treatment.
Explore Samsara, a viral metamorphic engine for JVM that transforms compiled targets, complicating analysis and enabling supply chain attacks from within IDEs, with added anti-debugging features.
Unveiling critical mistakes in APT campaigns across global threat actors, revealing advanced TTPs, and exploring real-time monitoring of sophisticated attacks. Insights on improving organizational defense against evolving threats.
Explore MikroTik's RouterOS internals, including IPC protocols, message formats, and cryptography. Learn about a new remote jailbreak and gain insights to accelerate RouterOS security research.
Explore the evolution of BlackMatter ransomware, its technical aspects, and its impact on the cybersecurity landscape. Gain insights into sophisticated ransomware operators and their tactics.
Explore Windows security vulnerabilities in ELAM and PPL, revealing how overly-permissive rules can be exploited for malware protection and code execution, hampering detection efforts.
Explore Function Overrides in Windows 11, from its origins as a security mitigation to its evolution as a performance feature. Learn about implementation, compiler modifications, and real-world applications.
Get personalized course recommendations, track subjects and courses with reminders, and more.