|
|
| 1. | | Security Incident Concerning Stormshield (stormshield.com) | | 1 point by meik on Feb 4, 2021 | past | |
| 2. | | TSIG authentication bypass through signature forgery in Knot DNS [pdf] (synacktiv.ninja) | | 1 point by meik on June 23, 2017 | past | |
| 3. | | The Story of yet another ransom-fail-ware (sogeti.com) | | 1 point by meik on June 7, 2016 | past | |
| 4. | | Dyreza's Anticrypt (lexsi-leblog.com) | | 6 points by meik on April 23, 2015 | past | |
| 5. | | Monitoring Zeus P2P and Dyreza with Malware Lofts (lexsi-leblog.com) | | 2 points by meik on April 23, 2015 | past | |
| 6. | | Taliban pose as pretty women on Facebook, dupe soldiers (zdnet.com) | | 1 point by meik on Sept 10, 2012 | past | |
| 7. | | Is Java Exploitable? (isjavaexploitable.com) | | 1 point by meik on Aug 28, 2012 | past | |
| 8. | | Metasploit exploit development - The series Part 1. (rapid7.com) | | 1 point by meik on July 5, 2012 | past | |
| 9. | | Some Nasty Attacks Against VMware vSphere 5 Based Cloud Infrastructures (insinuator.net) | | 1 point by meik on May 30, 2012 | past | |
|

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact
|