CSP Bypass Unveiled: The Hidden Threat of Bookmarklets
submitted by /u/ziyahanalbeniz
2023 Workshop on the Economics of Information Security
WEIS 2023, the 22nd Workshop on the Economics of Information Security, will be held in Geneva from July 5-7, with...
murphysec v3.1.6 releases: open source tool focused on software supply chain security
murphysec MurphySec CLI is used for detecting vulnerable dependencies from the command-line, and also can be integrated into your CI/CD pipeline....
Bearer v1.10.1 releases: finds risks and vulnerabilities in your code
Bearer Bearer is a static application security testing (SAST) tool that scans your source code and analyzes your data flows to discover,...
In search of the Triangulation: triangle_check utility
In our initial blogpost about “Operation Triangulation”, we published a comprehensive guide on how to manually check iOS device backups...
Quantum Reduction of Finding Short Code Vectors to the Decoding Problem
We give a quantum reduction from finding short codewords in a random linear code to decoding for the Hamming metric....
Materiality: It’s Not Always Straightforward
The Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) requires companies operating in critical infrastructure sectors to report...
On digital signatures based on isomorphism problems: QROM security, ring signatures, and applications
An isomorphism problem asks whether two combinatorial or algebraic structures are essentially the same. Based on the assumed hardness of...