CyberSecPolitics
Thursday, September 26, 2024
Mythical Beasts
›
One of the more interesting diplomatic processes in our space right now is the Pall-Mall process , a joint British and French effort to tack...
Tuesday, August 13, 2024
A quick research overview of the Research Handbook on Cyberwarfare
›
Introduction As you were reading the latest Research Handbook on Cyberwarfare (edited by Tim Stevens and Joe Devanny) you probably felt, li...
Friday, June 21, 2024
Automated LLM Bugfinders
›
So yesterday I read with interest a Project Zero Blog detailing their efforts to understand a pressing question: Will LLMs Replace VulnDev T...
Saturday, April 20, 2024
What Open Source projects are unmaintained and should you target for takeover ?
›
I spent some time looking at which open source packages have not been maintained or updated, and how depends on those packages. The answer i...
Thursday, April 18, 2024
The Open Source Problem
›
People are having a big freakout about the Jia Tan user and I want to throw a little napalm on that kitchen fire by showing ya'll what t...
Wednesday, April 3, 2024
Jia Tan and SocialCyber
›
I want to start by saying that Sergey Bratus and DARPA were geniuses at foreseeing the problems that have led us to Jia Tan and XZ. One of ...
Wednesday, June 15, 2022
The Atlantic Council Paper and Defending Forward
›
Paper linked here . One thing I liked about the new Cyber Statecraft paper is it had some POETRY to the language for once! Usually these thi...
›
Home
View web version