Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore a novel code injection technique, Dirty Vanity, that challenges current detection methods and expands attack possibilities by exploiting Windows' forking mechanism.
Explore AI-driven techniques for bypassing web application firewalls, addressing practical challenges in payload diversity and difficulty balancing. Learn innovative approaches to enhance cybersecurity defenses.
Explore MQTT vulnerabilities and their potential for network attacks, including firmware replacement, DNS hijacking, and DDoS. Learn about the broader security implications of MQTT in connected devices.
Explore new attack surfaces and weak code patterns in Android Bluetooth, uncovering hidden vulnerabilities despite recent security improvements. Learn about innovative approaches to Bluetooth bug hunting.
Explore the Rowhammer security vulnerability in DRAM, including the new Half-Double attack type and its implications for current mitigation strategies like Targeted Row Refresh.
Discover innovative bug-hunting techniques: event-based fuzzing, patch analysis, and comment inspection. Learn to leverage known vulnerabilities for deeper security research in Chrome and Android.
Explore Android Parcel vulnerabilities, exploit techniques, and a new exploit chain. Learn about security improvements and the introduction of SafeParcel for enhanced Android system protection.
Explore innovative attack techniques on NFT collections, including cross-contract ricochet attacks and off-chain marketplace logic exploitation, revealing vulnerabilities in Ethereum's decentralized ecosystem.
Explore techniques for decompiling compiled Deep Neural Network binaries, enabling model extraction, adversarial sample generation, and patching for enhanced security analysis of edge devices and embedded systems.
Explore the hidden world of cybercriminals targeting other cybercriminals on dark web forums. Uncover the thriving sub-economy of 'metaparasites' and their impact on criminal marketplaces.
Explore advanced cloud malware campaigns, focusing on serverless environments and containers. Learn about novel tactics used by adversaries to evade detection in cloud technologies.
Explore the creation of advanced wipers for cyber warfare, leveraging unprivileged user permissions to delete critical system files and render Windows unbootable through EDR exploitation.
Explore pitfalls in Memory Protection Unit usage for IoT security. Analyze top microcontroller operating systems, uncovering potential vulnerabilities in embedded device defenses.
Explore the Dutch Anti-DDoS Coalition's innovative approach to national cybersecurity through large-scale exercises, cooperative mitigation strategies, and cross-sector collaboration.
Explore techniques for cracking TLS protocols, conducting security protocol fuzzing, and analyzing vulnerabilities in Siemens S7-1500/S7-1200 PLCs, with practical demonstrations of exploiting and controlling these industrial devices.
Get personalized course recommendations, track subjects and courses with reminders, and more.