Hacker News new | past | comments | ask | show | jobs | submit | from login
Cellular Exploit on a Global Scale: The Rise and Fall of the Control Protocol [pdf] (blackhat.com)
1 point by CHEF-KOCH 46 days ago | past
Black Hat 2024: Secure Shells in Shambles [pdf] (blackhat.com)
101 points by hdmoore 3 months ago | past | 30 comments
Are Your Backups Still Immutable, Even Though You Can't Access Them? (blackhat.com)
1 point by gnabgib 3 months ago | past
All Your Secrets Belong to Us: Leveraging Firmware Bugs to Break Tees (blackhat.com)
1 point by gnabgib 3 months ago | past
Breaching AWS Accounts Through Shadow Resources (blackhat.com)
2 points by gnabgib 3 months ago | past
Bitsquatting – DNS Hijacking without Exploitation [pdf] (blackhat.com)
1 point by todsacerdoti 6 months ago | past
Ovpnx: Zero-Days Leading to RCE, LPE and KCE Affecting Endpoints (blackhat.com)
1 point by choult 6 months ago | past | 1 comment
LLM4Shell: Exploiting RCE Vulnerabilities in LLM-Integrated Frameworks and Apps (blackhat.com)
1 point by jviide 6 months ago | past
Fixing/Making Holes in Binaries [pdf] (blackhat.com)
2 points by alexahn on Oct 23, 2023 | past
The Art of Rooting Android Devices by GPU MMU Features [pdf] (blackhat.com)
2 points by skilled on Aug 16, 2023 | past | 1 comment
Unsafe at Any Speed: CISA's Plan to Foster Tech Ecosystem Security (blackhat.com)
1 point by pjmlp on Aug 15, 2023 | past
Diving into Windows Remote Access Service for Pre-Auth Bugs (blackhat.com)
1 point by rmason on Aug 11, 2023 | past
Passive Fingerprinting of HTTP/2 Client (2017) [pdf] (blackhat.com)
2 points by 8organicbits on April 19, 2023 | past
Make Redirection Evil Again: URL Parser Issues in OAuth (2013) [pdf] (blackhat.com)
1 point by mooreds on March 8, 2023 | past
Intel Visa: Through the Rabbit Hole (2019) [pdf] (blackhat.com)
2 points by Tomte on Jan 20, 2023 | past
Even the LastPass will be stolen, deal with it (2015) [pdf] (blackhat.com)
43 points by kl343 on Dec 25, 2022 | past | 21 comments
Compromising CI for Backdoors [pdf] (blackhat.com)
3 points by vmoore on Oct 2, 2022 | past | 1 comment
Detecting Fake 4G Base Stations in Real Time (2020) [pdf] (blackhat.com)
85 points by walterbell on July 26, 2022 | past | 17 comments
Intel Visa: Through the Rabbit Hole (2019) [pdf] (blackhat.com)
2 points by Tomte on May 30, 2022 | past
Managing and Understanding Entropy Usage (2015) [pdf] (blackhat.com)
1 point by Tomte on May 2, 2022 | past
Hacking chemical plants for competition and extortion (2015) [pdf] (blackhat.com)
1 point by Tomte on April 26, 2022 | past
2021: A Titan M Odyssey [pdf] (blackhat.com)
54 points by todsacerdoti on April 12, 2022 | past | 7 comments
How to hack SPF, DKIM и DMARC [pdf] (blackhat.com)
3 points by sam_lowry_ on Feb 9, 2022 | past
Attacks on Email Sender Authentication (blackhat.com)
85 points by _wldu on Jan 15, 2022 | past | 13 comments
HPE iLO5 Firmware Security – Go Home Cryptoprocessor, You're Drunk (blackhat.com)
1 point by fulafel on Dec 15, 2021 | past
Apple Neural Engine Internal: From ML Algorithm to HW Registers (blackhat.com)
126 points by blopeur on Dec 8, 2021 | past | 63 comments
Intel Visa: Through the Rabbit Hole (2019) [pdf] (blackhat.com)
2 points by Tomte on Sept 19, 2021 | past
Managing and Understanding Entropy Usage [pdf] (blackhat.com)
3 points by Tomte on Aug 26, 2021 | past
Hacking chemical plants for competition and extortion (2015) [pdf] (blackhat.com)
2 points by Tomte on Aug 21, 2021 | past
Everything has changed in iOS 14, but Jailbreak is eternal [pdf] (blackhat.com)
191 points by clubdorothe on Aug 7, 2021 | past | 64 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: