The Story of a Novel Supply Chain Attack| Medium
NIST Special Publication 800-63-3| pages.nist.gov
NFC-based devices, such as mobile digital wallets, contactless smart cards, and security keys (hardware authentication devices), are exposing users to NFC vulnerabilities in encryption, replay and side-channel attacks.| Cossack Labs
React Native security: What developers and team leads need to know. Handle risks and threats, prevent typical security mistakes, follow best engineering practices — learn from our experience.| Cossack Labs
Posted by Jann Horn, Project Zero We have discovered that CPU data cache timing can be abused to efficiently leak information out of mi...| googleprojectzero.blogspot.com
Website with the collection of all the cheat sheets of the project.| cheatsheetseries.owasp.org
NIST has finalized SP 800-218A, Secure Software Development Practices for Generative AI and Dual-Use Foundation Models: An SSDF Community Profile. This publication augments SP 800-218 by adding practices, tasks, recommendations, considerations, notes,...| csrc.nist.gov
NIST Special Publication 800-63B| pages.nist.gov