Backdoor detected in ESP32 Espressif IoT chip

Kerberos (III): How does delegation work?

Smart Meters – Threats and Attacks to PRIME Meters

Kerberos (I): How does Kerberos work? - Theory

Linux process infection (part I)