Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
lattera
.
3
Advanced Exploitation of Simple Bugs: A Parallels Desktop Case Study
pdf
slides
security
zerodayengineering.com
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
18
October 2021 Home Infrastructure Status
freebsd
networking
git.hardenedbsd.org
authored by
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
9
How a simple Linux kernel memory corruption bug can lead to complete system compromise
linux
security
googleprojectzero.blogspot.com
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
11
Memory-Model Recommendations for Rusting the Linux Kernel
linux
rust
security
paulmck.livejournal.com
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
Quantum Supremacy Using a Programmable Superconducting Processor
video
compsci
youtube.com
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
Technology Roadmap
freebsd
freebsdfoundation.org
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
OpenSSH updated to 8.7p1 in FreeBSD base
freebsd
cgit.freebsd.org
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
74
Not-a-Linux distro review: SerenityOS is a Unix-y love letter to the ’90s
osdev
arstechnica.com
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
9 comments
9
1
Beyond Firefighter vs. Safety Matches: Growing the DevSecOps Pipeline
video
security
youtube.com
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Securing your GitHub account with two-factor authentication
security
github.blog
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
5
NVMM hypervisor landed in DragonFly
dragonflybsd
virtualization
lists.dragonflybsd.org
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
13
Security Analysis of CHERI ISA
pdf
security
github.com
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
12
Let’s Talk OpenZFS Snapshots
freebsd
klarasystems.com
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
18
MyBee — FreeBSD OS and hypervisor bhyve as private cloud
freebsd
habr.com
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
11
Forensic Methodology Report: How to catch NSO Group’s Pegasus
security
amnesty.org
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
3
Introducing liblattutil
c
release
git.hardenedbsd.org
authored by
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
Binary Golf Grand Prix 2021
programming
n0.lol
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
10
Scammers mail fake Ledger devices to steal your cryptocurrency
security
bleepingcomputer.com
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
13
Reverse Engineering Supermicro IPMI (2018)
reversing
peterkleissner.com
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
18
Building a WebAuthn Click Farm — Are CAPTCHAs Obsolete?
security
betterappsec.com
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
68
Password Managers
security
lock.cmpxchg8b.com
via
lattera
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
38 comments
38
10
HardenedBSD May 2021 Status Report
freebsd
security
hardenedbsd.org
authored by
lattera
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
2
New sophisticated email-based attack from NOBELIUM
security
microsoft.com
via
lattera
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
BIAS: Bluetooth Impersonation AttackS
pdf
security
francozappa.github.io
via
lattera
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
Tracking One Year of Malicious Tor Exit Relay Activities (Part II)
privacy
nusenu.medium.com
via
lattera
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
<< Page 2
|
Page 4 >>