DICONIUM BLOG

Our latest thoughts & inspiration

Welcome to our blog. A place where we explore the future and explore the most exciting developments in the digital world. We covers topics that move us, inspire us and make us curious. Have fun and be inspired while reading!

Chaining Bugs from Self XSS to Account Takeover
Cybersecurity

Chaining Bugs from Self XSS to Account Takeover

Automotive Cybersecurity Regulations and Standards
Cybersecurity

Automotive Cybersecurity Regulations and Standards

Understanding Shellcode: Key Concepts for Cybersecurity Experts
Cybersecurity

Understanding Shellcode: Key Concepts for Cybersecurity Experts

PKI-as-a-service: Streamlining security token generation and signing for ECUs
Cybersecurity

PKI-as-a-service: Streamlining security token generation and signing for ECUs

Fief-server Server-Side Template Injection vulnerability
Cybersecurity

Fief-server Server-Side Template Injection vulnerability

Abusing Shared Libraries for Malicious Gains
Cybersecurity

Abusing Shared Libraries for Malicious Gains

Bare Metal Reversing Foundations: Physical Memory
Cybersecurity

Bare Metal Reversing Foundations: Physical Memory

Hunting Bugs in Linux Kernel With KASAN
Cybersecurity

Hunting Bugs in Linux Kernel With KASAN

You have seen 7 items out of 8

Show more