Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Windows container isolation, its implementation, and potential vulnerabilities. Learn about server silos, job objects, and the security implications of container breakouts.
Explore advanced fault injection techniques to bypass glitching protections on ARM TrustZone-M, revealing vulnerabilities in real-world computing devices and discussing potential countermeasures.
Explore CastGuard, a novel mitigation technique for preventing illegal static down-casts in C++ code, enhancing security in Windows components through efficient virtual function table pointer utilization.
Exposing critical security flaws in Samsung Galaxy devices' hardware-backed keystore through reverse engineering, revealing vulnerabilities in cryptographic design and implementation.
Discover how XML parsing quirks in XMPP can be exploited for attacks, including a demonstration of remote code execution in Zoom, presented by security researcher Ivan Fratric.
Explore advanced HTTP request smuggling techniques using browsers as attack platforms. Learn to exploit server vulnerabilities, poison connection pools, and launch sophisticated web attacks.
Explore OASIS, a framework for dynamic kernel analysis, enabling flexible control and data collection from kernel threads for various applications like memory introspection and malware testing.
Explore CI/CD pipeline vulnerabilities, their critical role in infrastructure, and novel exploitation techniques. Learn about real-world examples and demos of turning build pipelines into remote code execution vectors.
Explore the Open Threat Hunting Framework to build, operationalize, and scale threat hunting in organizations. Learn from industry experts about effective strategies and best practices.
Explore vulnerabilities in UWB Real Time Locating Systems, potential exploits, and mitigation strategies to secure these systems against cyber attacks.
Explore methodology for assessing ELAM drivers, demonstrating how overly-permissive rules enable adversary tradecraft opportunities through abuse of intended functionality, with practical demonstrations and insights.
Explore recent UEFI firmware security changes, focusing on Intel CPUs. Covers firmware mitigations in SMM/DXE and new attacks on Intel PPAM, offering unique insights from an offensive security perspective.
Explore hybrid machine learning for malware classification using static and dynamic analysis, Windows kernel emulation, and neural networks. Learn about adversarial ML and future developments.
Explores legal and ethical implications of security researchers handling sensitive user data during bug bounty disclosures, examining responsibilities and potential consequences for all parties involved.
Explore how government-linked cyber actors influence elections through disinformation campaigns, focusing on a case study from Colombia's 2022 elections and strategies for detecting such operations.
Get personalized course recommendations, track subjects and courses with reminders, and more.