Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Marketing
Cybersecurity
Machine Learning
Circuits and Electronics 1: Basic Circuit Analysis
Academic Writing Made Easy
Nutrition, Exercise and Sports
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Unveiling critical vulnerabilities in SAP enterprise software through analysis of the "P4" protocol, demonstrating tactics and techniques for remote and root access exploitation in mission-critical business systems.
Uncover vulnerabilities in Zoom's Zero Touch Provisioning for desk phones, exploring potential remote attacks and security implications in cloud communication platforms.
Explore VMware Workstation vulnerabilities, focusing on USB controller exploits. Learn about information leakage, arbitrary read/write, and bypassing Windows protections in virtualization escapes.
Unveils groundbreaking research on VMware hypervisor vulnerabilities, focusing on virtual USB controllers. Demonstrates novel VM escape techniques using URB, showcasing a critical heap out-of-bounds write vulnerability across all VMware platforms.
Explore Chrome's site isolation vulnerabilities in web-based apps, revealing how attackers can bypass security measures to execute malicious actions and compromise user data.
Explore security risks in autonomous driving controllers, including hardware structure, testing methods, and potential vulnerabilities. Learn to extract AI models and control vehicles remotely.
Explore innovative attack vector transforming EDR into stealthy malware. Learn to bypass security features, exfiltrate data, and establish persistent control, focusing on Palo Alto Networks Cortex XDR.
Rethinking cybersecurity metrics: Learn to develop meaningful measurements for detection and response capabilities, avoiding pitfalls of traditional metrics and motivating teams effectively.
Reveals new Android attack surface 'PiP', exploiting vulnerabilities to bypass security measures and perform stealthy hijacking attacks on modern devices without permissions or user awareness.
Explore Windows vulnerabilities related to file naming, leading to hidden files, process concealment, and remote code execution. Learn unprivileged rootkit techniques and attack chains.
Uncover critical RCE vulnerabilities in LLM-integrated frameworks and apps. Learn automated exploitation methods, potential impacts, and essential mitigation strategies for securing AI-powered systems.
Explore practical tools leveraging LLMs to scale security teams, streamline workflows, and enhance decision-making in complex environments. Gain insights on automating tasks and improving security processes.
Explore Python bytecode decompilers Uncompyle6 and Decompyle3. Learn tips, tricks, and novel techniques for recreating source code from bytecode, applicable to other languages and potential machine learning applications.
Unveiling sophisticated cyber-attacks disguised as job recruitment, featuring 0-day exploits and advanced rootkit capabilities. Explores novel attack methods targeting Asia, bypassing security measures.
Unveils critical vulnerability allowing remote data deletion in endpoint security products. Demonstrates attack vectors, explains root cause, and showcases bypass of Microsoft patch, impacting databases and system logs.
Get personalized course recommendations, track subjects and courses with reminders, and more.