Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore vulnerabilities in mobile face recognition systems, focusing on non-deepfake attacks that bypass liveness detection. Learn about security flaws in popular SDKs and their implications for critical applications.
Innovative cryptanalysis technique exploits power LED video footage to recover secret keys from devices, using rolling shutter for high-speed sampling and RGB analysis for key extraction.
Explore strategies for creating large datasets and two attacks exploiting these mechanics, revealing vulnerabilities in deep learning models trained on internet-sourced data.
Explore novel cyber deceptions targeting weaknesses in AI-driven attacks and an emulation system for evaluating deceptions and adversaries at scale.
Explore the implications of Yandex's leaked source code, revealing insights into data collection practices and behavioral analytics technologies used by the Russian search giant.
Uncover hidden security risks in H.264 video decoders using H26Forge framework. Learn to craft video files exposing edge cases and potential vulnerabilities in this complex, privileged ecosystem.
Explore Windows Protected Process Light (PPL) mechanism, its vulnerabilities, and historical exploits. Learn about PPLdump, its impact on system security, and Microsoft's approach to PPL-related vulnerabilities.
Explore voltage fault injection attacks on server platforms via PMBus, revealing vulnerabilities in power management systems and discussing potential security implications for data centers.
Explore how Prototype Pollution vulnerabilities in JavaScript can lead to remote code execution, analyzing Node.js core code and NPM packages for potential security risks.
Explore a novel DNS attack allowing adversaries to maintain revoked malicious domains, affecting mainstream DNS software and public resolvers. Learn about vulnerabilities in domain name delegation processes.
Explore how APT groups target Taiwan's media industry for cyber espionage, focusing on their tactics, motivations, and impact on daily activities and national security.
Explore Chrome WebSQL vulnerabilities and a mutation-based fuzzer for discovering SQLite bugs, enhancing web application security against remote attacks.
Explore the intersection of cybersecurity, AI, and ethical innovation as CISA Director Jen Easterly examines how technology narratives shape our collective digital future and security landscape.
Discover how researchers uncovered 10 vulnerabilities in Google's Quick Share, leading to QuickShell - a complex RCE attack chain exploiting file sharing protocols on Windows and Android.
Discover how dashcams can be compromised in minutes through automated DriveThru attacks, exposing private data and conversations with live demos and countermeasures.
Get personalized course recommendations, track subjects and courses with reminders, and more.