A Series of Unfortunate Event (Listeners)

The Hardware Procurement Iceberg: A Framework For Keeping Embedded Research Fun, Cheap, and Ethical

Hardware Implant Revolution II: Development of Hardware Implants for Red Team Operations

Ransomware vs. Info Stealers: A Comparative Analysis

From Concert Hall to Code Review, Symphony to Software

The Internet Is Fun Again and We Are Repeating All the Same Mistakes

FIPS-140 Level 3 encryption is just an API call away

IIoT: The “S” Still Stands for Security

Open Source House Party

Filtering the Noise: Crafting an Actionable Threat Feed from Community-Shared Intelligence