USENIX Security ’22 – Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu – ‘DnD: A Cross-Architecture Deep Neural Network Decompiler’
InfoSec USA
@InfoSecUSA
Joined March 2019
InfoSec USA’s Tweets
Union Budget 2023: How simplified KYC helps with Digital Customer Onboarding
Application Security for Microservices: API Gateway, Service Mesh, and More
Hunter Biden’s Laptop Revisited: What it Means for Cloud Storage
Password Managers Under Attack, Shady Reward Apps on Google Play, Meta Account Center 2FA Bypass
Top Web Application Security Testing Companies
1
USENIX Security ’22 – Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao – ‘Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks’
Finland’s Most-Wanted Hacker Nabbed in France
CyRC Special Report: How companies fared in the aftermath of Log4Shell
USENIX Security ’22 – Chong Xiang, Saeed Mahloujifar, Prateek Mittal – ‘PatchCleanser: Certifiably Robust Defense Against Adversarial Patches For Any Image Classifier’
1
From Progress to Bans: How Close Are Human Microchip Implants?
1
OpenSSH fixes double-free memory bug that’s pokable over the network
Meet an Open Source Developer – Theresa Mammarella
Wicked Good Development Episode 26: Tom Cools
A Conversation with Mark Houpt, CISO of Radware Partner DataBank
Atlassian Announces Critical Jira Service Management Vulnerability
Seceon 2023 Cybersecurity Predictions by Seceon Thought Leadership
Dynamic Approaches seen in AveMaria’s Distribution Strategy
1
USENIX Security ’22 – ‘How Machine Learning Is Solving The Binary Function Similarity Problem’
Gov Threatens Jail for Dangerously Diseased Americans Refusing Treatment
JSON-based SQL attacks bypassed WAFs but not Contrast Protect RASP technology | Contrast Security
Supply Chain Security: What is the SLSA? (Part I)
Dispelling CRQ Objections: Tips for CISOs Looking to Stay Ahead
