Janne TaponeninFraktalLaser Fault Injection for the Masses, Part 3This post explores chip decapping, and reveals a method that allows for chip decapping using the IR laser in our LFI rig.1d ago1d ago
Shikhar JoshiRestricted reverse SSH tunnelsToday, I was working on securing SSH connectivity between two machines. The main challenge with SSH is avoiding the need to open port 22…Sep 9Sep 9
Practical DevSecOpsHow to Become a Threat Modeling Expert: A Comprehensive GuideThreat modeling is a critical skill in the cybersecurity landscape, essential for identifying and mitigating potential security risks. This…Sep 5Sep 5
Janne TaponeninFraktalLaser Fault Injection for The Masses, Part 2In this article we discuss how LFI works and what kind of new injection techniques our rig enables.Aug 26Aug 26
Janne TaponeninFraktalLaser Fault Injection for The MassesIn this post we are breaking down barriers by open-sourcing a laser fault injection rig that costs less than 500 € to build.Aug 8Aug 8
Renae KanginAdobe Tech BlogAdobe Transforms Public Vulnerability Disclosure Program into a Paid Bug Bounty ProgramBy Daniel Ventura, Manager of Product Security Incident Response Team (PSIRT)Jul 25Jul 25
Saurabh JainTinkering with product security pt. 2Welcome back to the second installment in this series, let’s carry the momentum of what we learned in the previous blog. If not you can…Jul 11Jul 11
Saurabh JainTinkering with product securityWelcome to my latest series on product security, where I shall be sharing some of my personal experiences in product security, the…Jul 71Jul 71
Simply SecureShield Your Digital Assets Like a ProDid you know that a single cyberattack can severely affect a company’s finances and damage its reputation?Jul 2Jul 2
vikram naiduPart 2- Everything You Need to Know About Browser Security Policies — CSP, Cookie Attributes, etc.Hello Everyone, we have covered the Same Origin Policy ( SOP ), and Cross-Origin-Resource-Sharing (CORS) in part 1. Here is the URL for…Jun 21Jun 21