- Let’s Encrypt down due to investigation on potential ACME TLS-SNI vulnerability
- Detecting Spectre and Meltdown Using Hardware Performance Counters
- CPUs: information leak using speculative execution
- Meltdown Proof-of-Concept
- Many Formulas, One Calc – Exploiting a New Office Equation Vulnerability
- Important information about Microsoft Meltdown CPU security fixes, antivirus vendors and you
- KeystoneJS Open Source Penetration Testing Report – Gratis 2017
- WPA3 Features Explained – What is WPA3?
- Detection of the Meltdown and Spectre Vulnerabilities
- 1-Day Browser & Kernel Exploitation
- iOS kernel exploitation archaeology
- What Spectre and Meltdown Mean For WebKit
- (From 1995) The Intel 80x86 Process Architecture: Pitfalls for Secure Systems
- Firewall Detection in Penetration Tests (Sızma Testlerinde Firewall Tespiti)
- Demystifying Two Factor Auth
- Exploiting cheap labor!
- Introduction to reverse engineering and Assembly.
- Executable and Linkable Format 101 - Part 1 Sections and Segments
- Finding a CPU Design Bug in the Xbox 360
- How to Extract Media Files from iOS Devices