Fast16: High-precision software sabotage 5 years before Stuxnet

What It Takes to Defend a Cybersecurity Company from Today's Adversaries

Apple’s macOS Ventura – 7 New Security Changes to Be Aware Of

How a Rust Supply-Chain Attack Infected Cloud CI Pipelines with Go Malware

Firefox JIT Use-After-Frees | Exploiting CVE-2020-26950

Moving From Manual Reverse Engineering of UEFI Modules To Dynamic Emulation of UEFI Firmware

Hacktivism and State-Sponsored Knock-Offs. Attributing Deceptive Hack Operations

CVE-2021-43267: Remote Linux Kernel Heap Overflow | TIPC Module Allows Arbitrary Code Execution

Mysterious Wiper Paralyzes Iranian Trains with Epic Troll

macOS Privileged Access Backdoor

CVE-2021-21551- Hundreds Of Millions Of Dell Computers At Risk Due to Multiple BIOS Driver Privilege Escalation Flaws

Leveraging LD_AUDIT to Beat the Traditional Linux Library Preloading Technique

Moving From Manual Reverse Engineering of UEFI Modules To Dynamic Emulation of UEFI Firmware

Moving from Common-Sense Knowledge About UEFI to Dumping UEFI Firmware

How Two Firefox Zero Days Led to Two macOS Backdoors

Fixing a 16 year-old privacy problem in TLS with ESNI

Investigating a malware sample which sometimes fails to behave maliciously

Reverse engineering and exploitation of a Little Snitch vulnerability

SFG: Furtim's Parent

Teaching an old RAT new tricks

Vulnerability in Blackphone Puts Devices at Risk for Takeover