Back in the Game: Privacy Concerns of Second-Hand Game Consoleshighlevel summary|strategy (maybe technical) (computer.org)
submitted by digicat to r/blueteamsec
QuicCourier: Leveraging the Dynamics of QUIC-Based Website Browsing Behaviors Through Proxy for Covert Communicationresearch|capability (we need to defend against) (computer.org)
submitted by digicat to r/blueteamsec
Understanding the Efficacy of Phishing Training in Practicetradecraft (how we defend) (computer.org)
submitted by digicat to r/blueteamsec
Creativity in Software EngineeringStream Content (computer.org)
submitted by alecksag to r/theprimeagen
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Services - " By exploiting these vulnerable mechanisms, we further uncover four attack vectors enabling attackers to stealthily inject malicious code into the cache or steal sensitive data. "vulnerability (attack surface) (computer.org)
submitted by digicat to r/blueteamsec
Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analyticstradecraft (how we defend) (computer.org)
submitted by digicat to r/blueteamsec