Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Web Development
Digital Marketing
Extreme Geological Events
Teaching Young Learners Online
IngenierÃa de aeropuertos: diseño del lado aire según OACI (ICAO)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
XOM-switch: A security tool enabling XOM on Linux apps using PKU, protecting against code reuse attacks without source code or heavy binary rewriting. Enhances application security effortlessly.
Explore a new Android rooting solution, ReVent, exploiting a Use-After-Free vulnerability in 3.18 Linux kernels. Learn about breaking kernel isolation and ARM MMU features for device security.
Explore Wi-Fi Direct vulnerabilities in Android, HP printers, and Samsung Smart TVs. Learn about protocol architecture, discovery, connection processes, and frame formats. Includes PoC and fingerprinting tool release.
Explore Process Doppelgänging, a stealthy attack technique that evades security solutions. Learn its advantages over Process Hollowing and understand its detection challenges.
Unveiling vulnerabilities in S7CommPlus protocol, demonstrating potential security breaches in industrial control systems and proposing countermeasures for enhanced protection.
Explore vulnerability detection and exploitation in Intel Management Engine, bypassing protection mechanisms to run unsigned code on powered-off computers.
Explore GDPR compliance challenges for third-party JavaScript, examining privacy implications and potential solutions for data protection in web development.
Análisis detallado del malware Industroyer utilizado en el ciberataque a la red eléctrica de Ucrania en 2016, sus capacidades y el grupo de amenazas detrás del ataque.
Explore UEFI firmware security, vulnerabilities, and real-world applicability of attacks. Analyze rootkit scenarios and assess practical implications for system compromise at privileged levels.
Discover 24 techniques for gathering threat intelligence and tracking actors, illustrated with 30 real-world cases. Learn about crimeware vulnerabilities, C&C misconfigurations, and underground marketplaces.
Explore Go language runtime vulnerabilities, their impact on applications, and potential security risks in this in-depth analysis of Golang's growing adoption across various programming domains.
Explore OpenQuantumSafe, an open-source library for quantum-safe cryptography, including implementations, benchmarks, integration challenges, and future developments.
Explore practical cache covert channels in cloud environments for secret data exfiltration between isolated virtual machines, presented by security researchers at Black Hat Asia.
Explore CANToolz framework for CAN bus analysis, featuring black-box testing of automotive networks and ECUs. Learn practical use-cases for vehicle security research and penetration testing.
Explore fault injection techniques to bypass Secure Boot in embedded systems, focusing on hardware-based attacks when logical vulnerabilities are absent.
Get personalized course recommendations, track subjects and courses with reminders, and more.