Featured Featured | Risk Management | vulnerabilities | August 11, 2023 Vulnerabilities Impacting Dozens of Major Wallet Providers Multiple zero-day vulnerabilities in some of the most used cryptographic multi-party computation (MPC) protocols, including GG-18, GG-20, and implementations of… Read More Editor's Desk Editor's Desk | Featured | Miscellaneous | vulnerabilities | October 12, 2022 The Race to Native Code Execution in PLCs Using RCE to Uncover Siemens SIMATIC S7-1200/1500 Hardcoded Cryptographic Keys Written by Team82. Close to 10 years ago, Siemens introduced… Read More Cyber Resilience Cyber Resilience | Data Breach | Risk Management | vulnerabilities | November 11, 2020 PLATYPUS: New vulnerabilities discovered in Intel processors An international team of security researchers, including experts from the University of Birmingham, is presenting new side-channel attacks, which use… Read More
Editor's Desk Editor's Desk | Featured | Miscellaneous | vulnerabilities | October 12, 2022 The Race to Native Code Execution in PLCs Using RCE to Uncover Siemens SIMATIC S7-1200/1500 Hardcoded Cryptographic Keys Written by Team82. Close to 10 years ago, Siemens introduced… Read More Cyber Resilience Cyber Resilience | Data Breach | Risk Management | vulnerabilities | November 11, 2020 PLATYPUS: New vulnerabilities discovered in Intel processors An international team of security researchers, including experts from the University of Birmingham, is presenting new side-channel attacks, which use… Read More
Cyber Resilience Cyber Resilience | Data Breach | Risk Management | vulnerabilities | November 11, 2020 PLATYPUS: New vulnerabilities discovered in Intel processors An international team of security researchers, including experts from the University of Birmingham, is presenting new side-channel attacks, which use… Read More