Black Hat 2023: Cyberwar fire-and-forget-me-not Posted on September 13, 2023 What happens to cyberweapons after a cyberwar?
What is Elliptic Curve Cryptography (ECC) and How Does it Work? Security The technological advancements that have come with the digital age… rooter September 29, 2023 2 min read 0
Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344 Security The story of a signed UEFI application allowing a UEFI… rooter February 17, 2025 1 min read 0
Hackers hijacked the eScan Antivirus update mechanism in malware campaign Security A malware campaign has been exploiting the updating mechanism of… rooter April 24, 2024 4 min read 0
AIs Exploiting Smart Contracts Security I have long maintained that smart contracts are a dumb… rooter December 11, 2025 2 min read 0