Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

Constant-time support coming to LLVM: Protecting cryptographic code

LLVM Adds Constant-Time Support for Protecting Cryptographic Code

We found cryptography bugs in the elliptic library using Wycheproof

Supply chain attacks are exploiting our assumptions

How we avoided side-channels in our new post-quantum Go cryptography libraries

The cryptography behind electronic passports

Subverting code integrity checks to locally backdoor Signal, 1Password, Slack, and more

Weaponizing image scaling against production AI systems

Marshal madness: A brief history of Ruby deserialization exploits

Buttercup is now open-source

Exploiting zero days in abandoned hardware

Unexpected security footguns in Go's parsers

The cryptography behind passkeys

Making PyPI's test suite 81% faster

A New ASN.1 API for Python

The $1.5B Bybit Hack

Don't Recurse on Untrusted Input

Best practices for key derivation

Attestations: A new generation of signatures on PyPI

A deep dive into Linux's new mseal syscall

Fuzzing between the lines in popular barcode software

Microsoft didn't sandbox Windows Defender, so I did (2017)

Friends don’t let friends reuse nonces

"Unstripping" binaries: Restoring debugging information in GDB with Pwndbg

Why You Should Stop Using RSA: A Deep Dive Into Its Security Pitfalls

Notes on AWS Nitro Enclaves: Attack Surface

AWS Nitro Enclaves: Attack Surface

Provisioning cloud infrastructure the wrong way, but faster

“YOLO” is not a valid hash construction

Our audit of Homebrew

More →