←Home Blog About Press Media Subscribe

2025

Sep 30
Optimizing AlphaFold's Triangle Multiplicative Update: A First Look at GPU Performance Engineering
GPU Optimization PyTorch Triton AlphaFold Machine Learning Performance Engineering H100 Tensor Cores
Sep 28
Multi-GPU Programming with AMD's Iris Framework for Triton
AMD GPU Triton Multi-GPU Parallel Computing Iris
Sep 23
Gluon: When Triton Isn't Low-Level Enough
GPU Triton Gluon Performance CUDA Deep Learning PyTorch
Sep 17
CVE-2025-21043: When DNG Opcodes Become Attack Vectors
CVE-2025-21043 DNG zero-day WhatsApp Android Samsung ELEGANTBOUNCER
Sep 14
The Hidden Math Bug That Makes AI Unpredictable
determinism floating-point neural-networks pytorch mlx
Aug 27
Building Agents for Small Language Models: A Deep Dive into Lightweight AI
LLM AI Agents Small Models Local AI Edge Computing
Aug 24
ELEGANTBOUNCER: When You Can't Get the Samples but Still Need to Catch the Threat
FORCEDENTRY BLASTPASS TRIANGULATION CVE-2021-30860 CVE-2023-4863 CVE-2025-43300 NSO Pegasus 0-click Detection
Aug 23
Detecting CVE-2025-43300: A Deep Dive into Apple's DNG Processing Vulnerability
CVE-2025-43300 DNG JPEG iOS 0-click RCE Detection

2024

Oct 14
Bob and Alice in Kernel-land - Part 3
bug kernel
Aug 23
Bob and Alice in Kernel-land - Part 2
bug kernel
Aug 18
Financial Forensics in a fragmented ecosystem
financial forensics brics
Aug 10
Election Security - Friday Review
democracy
Jul 20
Bob and Alice in Kernel-land
bug kernel

2023

Dec 30
Researching Triangulation: Detecting CVE-2023-41990 with single byte signatures.
bug truetype apple
Dec 24
Researching BLASTPASS: Analysing the Apple & Google WebP POC file - Part 2
bug webp apple google
Sep 27
Researching BLASTPASS: Detecting the exploit inside a WebP file - Part 1
rust

2022

Dec 19
Researching FORCEDENTRY: Detecting the Exploit With No Samples
rust
Nov 10
POC 2022 - Korea - Keynote 🦀
rust
Aug 22
Vegas 2022 - A web3 security review
web3
May 5
Magnet Forensics Acquires Cybersecurity Software Firm Comae Technologies
acquisition

2020

Dec 25
SUNBURST & Memory Analysis
solarwinds sunburst
Aug 12
Azure Sphere Internals - Overview
iot bugbounty arm
Jul 1
SMBaloo - Building a RCE exploit for Windows ARM64 (SMBGhost Edition)
exploit arm64
Feb 12
Twitter's Information Operations - An OSINT Analysis
disinformation twitter
Jan 11
Facebook's Coordinated Inauthentic Behavior - An OSINT Analysis

2019

Apr 24
How to Solve the Blindspots of Event-Driven Detection

2018

Feb 20
Rethinking Logging for Critical Assets

2017

Dec 27
Smart Contract Languages to Follow
web3
Jul 7
Porosity: A Decompiler For Blockchain-Based Smart Contracts Bytecode
security ethereum
Jun 28
Petya.2017 is a wiper not a ransomware
Jun 27
Petya— Enhanced WannaCry ?
Jun 10
Lessons from TV5Monde 2015 Hack
security dfir
May 19
WannaCry — Decrypting files with WanaKiwi + Demos
May 15
WannaCry — Links to Lazarus Group
May 14
WannaCry — New Variants Detected!
May 12
WannaCry — The largest ransom-ware infection in History
Apr 20
PASSFREELY: Oracle & SWIFT at risk
Apr 14
ShadowBrokers: The NSA compromised the SWIFT Network

2009

Jan 29
Windows 7 and Windows Server 2008 R2 djoin (Offline Domain Join) utility.
dfir ad

2008

Sep 17
Retrieving MmPhysicalMemoryBlock regardless of the NT version
dfir
Jul 28
Check your system virginity in less than 60 seconds.
dfir
Apr 3
X-Ways Forensics Beta 2 and hibernation file. (coincidence?)
dfir
/>
© Copyright 2025 ❤️