DICONIUM BLOG
Our latest thoughts & inspiration
Welcome to our blog. A place where we explore the future and explore the most exciting developments in the digital world. We covers topics that move us, inspire us and make us curious. Have fun and be inspired while reading!

Cybersecurity
Chaining Bugs from Self XSS to Account Takeover
%201%20(2).png?width=713&height=574&name=u1391528844_GenAI_Content_Strategy_--ar_21_--sref_httpss.mj.run_f22dce2e-44b6-4900-9aff-4025a4544f74%20(1)%201%20(2).png)
Cybersecurity
Automotive Cybersecurity Regulations and Standards

Cybersecurity
Understanding Shellcode: Key Concepts for Cybersecurity Experts

Cybersecurity
PKI-as-a-service: Streamlining security token generation and signing for ECUs

Cybersecurity
Fief-server Server-Side Template Injection vulnerability

Cybersecurity
Abusing Shared Libraries for Malicious Gains

Cybersecurity
Bare Metal Reversing Foundations: Physical Memory

Cybersecurity
Hunting Bugs in Linux Kernel With KASAN
You have seen 7 items out of 8
Show more