Seclog - #97

RosecurifyRosecurify
1 min read
  • Blog - Security research on Private Cloud Compute - Detailed research on Apple's Private Cloud Compute security infrastructure. Read More

  • Against /tmp - An analysis of temporary directory security considerations. Read More

  • Lose your device, but keep your keys - Exploring threshold signatures for key security. Read More

  • Bluetooth Low Energy GATT Fuzzing - Deep dive into BLE security testing. Read More

  • Using Nix to Fuzz Test a PDF Parser - Tutorial on implementing fuzz testing with Nix. Read More

  • Reconnaissance: Azure Cloud - Guide to Azure cloud reconnaissance techniques. Read More

  • LLM Penetration Testing Checklist - Comprehensive guide for testing LLM security. Read More

  • Company forced to change name that could be used to hack websites - Interesting case of security implications in company naming. Read More

🎥 SecVideo

  • DEF CON 32 - Counter Deception: Defending Yourself in a World Full of Lies - Insights on defending against deception tactics. Watch Here

💻 SecGit

For suggestions and any feedback, please contact: securify@rosecurify.com

0
Subscribe to my newsletter

Read articles from Rosecurify directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Rosecurify
Rosecurify