~lobsters | Bookmarks (136)
-
-
The AWS S3 Denial of Wallet Amplification Attack
The way AWS meters data transfer costs may make your business vulnerable in a way you...
-
Examining Malicious Hugging Face ML Models with Silent Backdoor
In the realm of AI collaboration, Hugging Face reigns supreme. But could it be the target...
-
The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNS
Abstract: Availability is a major concern in the design of DNSSEC. To ensure availability, DNSSEC follows...
-
Tenement Farming and Cloud HSMs | UNMITIGATED RISK
While it’s fair to say that using a Cloud HSM means your keys are protected by...
-
How to Hold KEMs
A living document on how to juggle these damned things. What’s a KEM? A KEM is...