Результаты поиска
  1. 23 мая 2017 г.

    Концепт-арт к фильму Чужой: Завет (Alien: Covenant) / ..

  2. 9 апр. 2018 г.
  3. 41 минуту назад

    reinventing themselves once again with 11 ☄️ A major UI / UX overhaul and a TON of new features + network integration. You most likely already have scatter, just don’t forget to UPDATE -> 💳🔐💻📱

  4. 26 июн.

    Our Director, Dr. Tom Verhelst enjoying a few of the 100 simultaneous events during . The event is focused on building a smarter future through collaborative innovation a goal well aligned with .

  5. 25 июн.

    NEW Scatter release is AMAZING! Token is showing its real POWER!

  6. 24 июн.

    I think ‘s token may play a large role in security and reputation in the coming years.

  7. 21 июн.

    Pour le moment 3 scénarios d'attaques ont été identifiés : - (exploitant la CVE-2018-12126)wxcv - (exploitant la CVE-2018-12127, CVE-2018-12130 et CVE-2019-11091) - (exploitant la CVE-2018-12130)

  8. 17 июн.

    Now at : & from talking about and speculative execution vulnerabilities on cpus.

  9. 5 июн.

    Our first year group was a wonderful experience! Had the pleasure to conclude the year with a talk on my understanding on why attacks work. For the interested, check my slides on and here :) And join us next year for great talks and amazing people!

    Показать эту ветку
  10. 24 мая

    Now online ’s great talk at about the attack: Rogue In-Flight Data Load. Cc

  11. 20 мая

    Many of you asked about the / disclosure process and independent finders. It has been confusing, also to us. We tried to piece this together. Check out the updated timeline on for all the details!

  12. 20 мая

    's presents , the vulnerability in Intel CPUs that allows unprivileged attackers to leak sensitive information across *any* security boundary. Even from javascript.

  13. 16 мая

    Cross VMs string leaks are now super fast when adding the byte masking techniques described on both and paper 😍 cc

    Показать эту ветку
  14. 15 мая

    "hardware is the new software except it is much harder to fix" describing the / side-channel attack at AMSSEC

  15. 15 мая

    Very nice interactive diagram at Perhaps most telling is how many uncolored parts remain to be explored..

  16. 15 мая

    Como era de esperar, después de Meltdown, Spectre y L1TF, tenemos nuevos ataques explotando vulnerabilidades en la microarquitectura de los procesadores. Voy a explicar un poco en qué consisten

    Показать эту ветку
  17. 14 мая

    Also everyone on the other (non ) attacks: super cool work! Probably forgetting some (apologies in advance), but here goes: @danielmgmi

  18. 14 мая

    Here's a longer technical deep dive explainer of (Microarchitectural Data Sampling):

  19. 14 мая

    Wanna know about and class of vulnerabilities? Come to the AMSec workshop in Amsterdam tomorrow and learn about how your Intel CPUs shout out your deepest secrets.

Загрузка может занять некоторое время.

Вероятно, серверы Твиттера перегружены или в их работе произошел кратковременный сбой. Повторите попытку или посетите страницу Статус Твиттера, чтобы узнать более подробную информацию.