Mekin Pesen

6 Followers | 1 Following

Follow

Mekin Pesen

32 days ago

2021 has broken the record for zero-day hacking attacks

technologyreview.com

Mekin Pesen

50 days ago

Blockchain and Trust

schneier.com

Mekin Pesen

51 days ago

SolarWinds and the Holiday Bear Campaign: A Case Study for the Classroom

lawfareblog.com

Mekin Pesen

64 days ago

The Attack Path Management Manifesto

posts.specterops.io

Mekin Pesen

73 days ago

Broken trust: Lessons from Sunburst

atlanticcouncil.org

Mekin Pesen

97 days ago

The great chip crisis threatens the promise of Moore’s Law

technologyreview.com

Mekin Pesen

100 days ago

Chinese Scientists Say They Now Have the World’s Most Powerful Quantum Computer

futurism.com

Mekin Pesen

111 days ago

Bitcoin myths: immutability, decentralisation, and the cult of “21 million”

davidgerard.co.uk

Mekin Pesen

157 days ago

Beating the code breakers: How quantum computing changes everything

ey.com

Mekin Pesen

157 days ago

The Full Story of the Stunning RSA Hack Can Finally Be Told

wired.com

Mekin Pesen

157 days ago

NATO increasingly sees its soldiers’ phones as a liability

economist.com

Mekin Pesen

191 days ago

The SolarWinds Hack Is Just the Beginning

foreignaffairs.com

Mekin Pesen

205 days ago

GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence

microsoft.com

Mekin Pesen

205 days ago

Who Contains the Containers?

googleprojectzero.blogspot.com

Mekin Pesen

205 days ago

Who Contains the Containers?

googleprojectzero.blogspot.com

Mekin Pesen

205 days ago

Serving up zero-knowledge proofs

blog.trailofbits.com

Mekin Pesen

205 days ago

Google’s top security teams unilaterally shut down a counterterrorism operation

technologyreview.com

Mekin Pesen

247 days ago

This tool lets you confuse Google’s ad network, and a test shows it works

technologyreview.com

Mekin Pesen

250 days ago

Encrypted DNS⇒Privacy? A Traffic Analysis Perspective

ndss-symposium.org

Mekin Pesen

250 days ago

Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies

medium.com

Mekin Pesen

266 days ago

Data Driven Security Hardening in Android

security.googleblog.com

Mekin Pesen

288 days ago

The U.S. Failed to Execute Its Cyberstrategy—and Russia Pounced

foreignaffairs.com

Mekin Pesen

327 days ago

Sophisticated new Android malware marks the latest evolution of mobile ransomware

microsoft.com

Mekin Pesen

367 days ago

The Lawless Realm

foreignaffairs.com

Mekin Pesen

388 days ago

Complexity In Capital: Demystifying The Hype In Cybersecurity

forbes.com

Mekin Pesen

392 days ago

SpaceX’s Starlink satellites could make US Army navigation hard to jam

technologyreview.com

Mekin Pesen

429 days ago

A world divided into “cans” and “cannots”

technologyreview.com

Mekin Pesen

448 days ago

The quest for quantum-proof encryption just made a leap forward

technologyreview.com

Mekin Pesen

490 days ago

Web skimming with Google Analytics

securelist.com

Mekin Pesen

495 days ago

Microsoft Security Best Practices

docs.microsoft.com

Mekin Pesen

495 days ago

Extracting credentials from a remote Windows system

deloitte.com

Mekin Pesen

495 days ago

How Zero Trust Will Change Your Security Design Approach

securityintelligence.com

Mekin Pesen

495 days ago

Mobile Security Framework (MobSF)

github.com

Mekin Pesen

497 days ago

Creating Active Directory Labs for Blue and Red Teams

sec-consult.com

Mekin Pesen

497 days ago

Running dodgy programs safely with Windows Sandbox

scotthelme.co.uk

Mekin Pesen

523 days ago

A perfect laconism for tackling security...

Success in security: reining in entropy

microsoft.com

Mekin Pesen

557 days ago

Worst Recession in 150 Years

dailyreckoning.com

Mekin Pesen

561 days ago

Threat Mapper - Powerful vulnerability scanner for Kubernetes and more

reddit.com

Mekin Pesen

566 days ago

The Politic

thepolitic.org

Mekin Pesen

589 days ago

How Living Abroad Helps You Develop a Clearer Sense of Self

hbr.org

Mekin Pesen

589 days ago

200 universities just launched 600 free online courses. Here’s the full list.

qz.com

Mekin Pesen

589 days ago

Windows Server Hardening with PowerShell DSC

blog.nviso.eu

Mekin Pesen

589 days ago

Kerberosity Killed the Domain: An Offensive Kerberos Overview

posts.specterops.io

Mekin Pesen

676 days ago

Microservice Architecture at Medium

medium.engineering

Mekin Pesen

681 days ago

How elliptic curve cryptography works in TLS 1.3

habr.com

Mekin Pesen

681 days ago

CIA History and Birth of Modern American Information Warfare

flyingpenguin.com

Mekin Pesen

681 days ago

The Githubification of InfoSec

medium.com

Mekin Pesen

704 days ago

3 techniques to defend your Machine Learning models against Adversarial attacks

blog.nviso.be

Mekin Pesen

710 days ago

Ghost ships, crop circles, and soft gold: A GPS mystery in Shanghai

technologyreview.com

Mekin Pesen

710 days ago

Security Engineering — The Book

cl.cam.ac.uk

Like this set of items on Pocket? Share with friends.