←
Home
Blog
About
Press
Media
Subscribe
2025
Sep 30
Optimizing AlphaFold's Triangle Multiplicative Update: A First Look at GPU Performance Engineering
GPU Optimization
PyTorch
Triton
AlphaFold
Machine Learning
Performance Engineering
H100
Tensor Cores
Sep 28
Multi-GPU Programming with AMD's Iris Framework for Triton
AMD
GPU
Triton
Multi-GPU
Parallel Computing
Iris
Sep 23
Gluon: When Triton Isn't Low-Level Enough
GPU
Triton
Gluon
Performance
CUDA
Deep Learning
PyTorch
Sep 17
CVE-2025-21043: When DNG Opcodes Become Attack Vectors
CVE-2025-21043
DNG
zero-day
WhatsApp
Android
Samsung
ELEGANTBOUNCER
Sep 14
The Hidden Math Bug That Makes AI Unpredictable
determinism
floating-point
neural-networks
pytorch
mlx
Aug 27
Building Agents for Small Language Models: A Deep Dive into Lightweight AI
LLM
AI Agents
Small Models
Local AI
Edge Computing
Aug 24
ELEGANTBOUNCER: When You Can't Get the Samples but Still Need to Catch the Threat
FORCEDENTRY
BLASTPASS
TRIANGULATION
CVE-2021-30860
CVE-2023-4863
CVE-2025-43300
NSO
Pegasus
0-click
Detection
Aug 23
Detecting CVE-2025-43300: A Deep Dive into Apple's DNG Processing Vulnerability
CVE-2025-43300
DNG
JPEG
iOS
0-click
RCE
Detection
2024
Oct 14
Bob and Alice in Kernel-land - Part 3
bug
kernel
Aug 23
Bob and Alice in Kernel-land - Part 2
bug
kernel
Aug 18
Financial Forensics in a fragmented ecosystem
financial forensics
brics
Aug 10
Election Security - Friday Review
democracy
Jul 20
Bob and Alice in Kernel-land
bug
kernel
2023
Dec 30
Researching Triangulation: Detecting CVE-2023-41990 with single byte signatures.
bug
truetype
apple
Dec 24
Researching BLASTPASS: Analysing the Apple & Google WebP POC file - Part 2
bug
webp
apple
google
Sep 27
Researching BLASTPASS: Detecting the exploit inside a WebP file - Part 1
rust
2022
Dec 19
Researching FORCEDENTRY: Detecting the Exploit With No Samples
rust
Nov 10
POC 2022 - Korea - Keynote 🦀
rust
Aug 22
Vegas 2022 - A web3 security review
web3
May 5
Magnet Forensics Acquires Cybersecurity Software Firm Comae Technologies
acquisition
2020
Dec 25
SUNBURST & Memory Analysis
solarwinds
sunburst
Aug 12
Azure Sphere Internals - Overview
iot
bugbounty
arm
Jul 1
SMBaloo - Building a RCE exploit for Windows ARM64 (SMBGhost Edition)
exploit
arm64
Feb 12
Twitter's Information Operations - An OSINT Analysis
disinformation
twitter
Jan 11
Facebook's Coordinated Inauthentic Behavior - An OSINT Analysis
2019
Apr 24
How to Solve the Blindspots of Event-Driven Detection
2018
Feb 20
Rethinking Logging for Critical Assets
2017
Dec 27
Smart Contract Languages to Follow
web3
Jul 7
Porosity: A Decompiler For Blockchain-Based Smart Contracts Bytecode
security
ethereum
Jun 28
Petya.2017 is a wiper not a ransomware
Jun 27
Petya— Enhanced WannaCry ?
Jun 10
Lessons from TV5Monde 2015 Hack
security
dfir
May 19
WannaCry — Decrypting files with WanaKiwi + Demos
May 15
WannaCry — Links to Lazarus Group
May 14
WannaCry — New Variants Detected!
May 12
WannaCry — The largest ransom-ware infection in History
Apr 20
PASSFREELY: Oracle & SWIFT at risk
Apr 14
ShadowBrokers: The NSA compromised the SWIFT Network
2009
Jan 29
Windows 7 and Windows Server 2008 R2 djoin (Offline Domain Join) utility.
dfir
ad
2008
Sep 17
Retrieving MmPhysicalMemoryBlock regardless of the NT version
dfir
Jul 28
Check your system virginity in less than 60 seconds.
dfir
Apr 3
X-Ways Forensics Beta 2 and hibernation file. (coincidence?)
dfir