DICONIUM BLOG

Our latest thoughts & inspiration

Welcome to our blog. A place where we explore the future and explore the most exciting developments in the digital world. We covers topics that move us, inspire us and make us curious. Have fun and be inspired while reading!

Chaining Bugs from Self XSS to Account Takeover

Chaining Bugs from Self XSS to Account Takeover

Automotive Cybersecurity Regulations and Standards

Automotive Cybersecurity Regulations and Standards

Understanding Shellcode: Key Concepts for Cybersecurity Experts

Understanding Shellcode: Key Concepts for Cybersecurity Experts

PKI-as-a-service: Streamlining security token generation and signing for ECUs

PKI-as-a-service: Streamlining security token generation and signing for ECUs

Fief-server Server-Side Template Injection vulnerability

Fief-server Server-Side Template Injection vulnerability

Abusing Shared Libraries for Malicious Gains

Abusing Shared Libraries for Malicious Gains

Bare Metal Reversing Foundations: Physical Memory

Bare Metal Reversing Foundations: Physical Memory

Hunting Bugs in Linux Kernel With KASAN

Hunting Bugs in Linux Kernel With KASAN

You have seen 7 items out of 8

Show more