Summary

Total Articles Found: 11

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • NAT Slipstreaming v2.0: New Attack Variant Can Expose All Internal Network Devices to The Internet
  • How it works: The novel HTTP/2 ‘Rapid Reset’ DDoS attack
  • I Hope This Sticks: Analyzing ClipboardEvent Listeners for Stored XSS
  • A walk through Project Zero metrics
  • SHA-3 Buffer Overflow (Part 2)
  • Tor Browser & OONI Security Audit Findings
  • iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices
  • Updated GPG key for signing Firefox Releases
  • Telenot Complex: Insecure AES Key Generation
  • Hunting nonce-based CSP bypasses with dynamic analysis

Tor Browser & OONI Security Audit Findings

Published: 2023-10-27 16:01:41

Popularity: None

Author: freddyb@users.lobste.rs (freddyb)

Keywords:

  • security
  • privacy
  • Comments

    ...more

    How it works: The novel HTTP/2 ‘Rapid Reset’ DDoS attack

    Published: 2023-10-10 12:34:31

    Popularity: 44

    Author: freddyb@users.lobste.rs (freddyb)

    Keywords:

  • security
  • web
  • Comments

    ...more

    iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices

    Published: 2023-10-25 18:52:58

    Popularity: None

    Author: freddyb@users.lobste.rs (freddyb)

    Keywords:

  • security
  • Comments

    ...more

    Updated GPG key for signing Firefox Releases

    Published: 2023-05-11 20:44:02

    Popularity: None

    Author: freddyb@users.lobste.rs (freddyb)

    Keywords:

  • security
  • Comments

    ...more

    SHA-3 Buffer Overflow (Part 2)

    Published: 2023-05-30 18:30:30

    Popularity: 2

    Author: freddyb@users.lobste.rs (freddyb)

    Keywords:

  • security
  • cryptography
  • Comments

    ...more

    I Hope This Sticks: Analyzing ClipboardEvent Listeners for Stored XSS

    Published: 2022-12-19 09:57:37

    Popularity: 6

    Author: freddyb@users.lobste.rs (freddyb)

    Keywords:

  • security
  • web
  • Comments

    ...more

    A walk through Project Zero metrics

    Published: 2022-02-10 19:43:49

    Popularity: 4

    Author: freddyb@users.lobste.rs (freddyb)

    Keywords:

  • security
  • practices
  • Comments

    ...more

    Telenot Complex: Insecure AES Key Generation

    Published: 2022-01-18 12:06:54

    Popularity: None

    Author: freddyb@users.lobste.rs (freddyb)

    Keywords:

  • security
  • hardware
  • Comments

    ...more

    Hunting nonce-based CSP bypasses with dynamic analysis

    Published: 2021-09-17 14:08:49

    Popularity: None

    Author: freddyb@users.lobste.rs (freddyb)

    Keywords:

  • security
  • web
  • Comments

    ...more

    Spectre Exploit Published

    Published: 2021-03-12 17:54:13

    Popularity: None

    Author: freddyb@users.lobste.rs (freddyb)

    Keywords:

  • browsers
  • security
  • LLM Says: ""Patch now, please""

    Comments

    ...more

    NAT Slipstreaming v2.0: New Attack Variant Can Expose All Internal Network Devices to The Internet

    Published: 2021-01-27 18:40:22

    Popularity: 137

    Author: freddyb@users.lobste.rs (freddyb)

    Keywords:

  • security
  • Comments

    ...more

    end