News

AI and quantum development won't be slowing down any time soon, and hackers are only getting more sophisticated.
Aiming at the demand for information system password encryption protection, this paper proposed a new set of password storage and transmission encryption model. In the process of password storage ...
Control flow integrity (CFI) plays an important role in defending against code reuse attacks (CRA). It protects the program's control flow from being hijacked by restricting control flow transfers ...
Application security best practices and code implementations for Java developers. This project is intended for didactic purposes only, supporting my training course.
The vulnerabilities, tracked as CVE-2025-0055 and CVE-2025-0056, involved weak or absent encryption in the input history function of SAP GUI for Windows and SAP GUI for Java, exposing sensitive ...