Vulnerabilities in supply chains aren’t a new topic and have quite a bit of focus from both a hardware and software perspective. With this post,
In a previous blog post, we looked at the unintended effects of feeding random noise to a group of pre-trained neural networks. The subject of
I’m fascinated by system failures and oddities, especially when systems are operating under normal conditions. A while back I saw a slide by Ian Goodfellow
Security conferences have been part of my life for the past two decades. I’ve learned so much, met lifelong friends, and got involved with countless
Throughout my years on the review board for Black Hat, I’ve seen quite a few mistakes in submissions. Many of these mistakes are ones I’ve
KZen hired Kudelski Security to perform a security assessment of their Multi-party ECDSA library and provided us access to their source code and associated documentation.