Seclog - #97

ยท

1 min read

  • Blog - Security research on Private Cloud Compute - Detailed research on Apple's Private Cloud Compute security infrastructure. Read More

  • Against /tmp - An analysis of temporary directory security considerations. Read More

  • Lose your device, but keep your keys - Exploring threshold signatures for key security. Read More

  • Bluetooth Low Energy GATT Fuzzing - Deep dive into BLE security testing. Read More

  • Using Nix to Fuzz Test a PDF Parser - Tutorial on implementing fuzz testing with Nix. Read More

  • Reconnaissance: Azure Cloud - Guide to Azure cloud reconnaissance techniques. Read More

  • LLM Penetration Testing Checklist - Comprehensive guide for testing LLM security. Read More

  • Company forced to change name that could be used to hack websites - Interesting case of security implications in company naming. Read More

๐ŸŽฅ SecVideo

  • DEF CON 32 - Counter Deception: Defending Yourself in a World Full of Lies - Insights on defending against deception tactics. Watch Here

๐Ÿ’ป SecGit

For suggestions and any feedback, please contact: securify@rosecurify.com

ย