Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
MinHash vs. Bitwise Set Hashing: Jaccard Similarity Showdown (endgame.com)
1 point by bra-ket on Nov 15, 2019 | past
NLP for Security: Malicious Language Processing (endgame.com)
1 point by godelmachine on Sept 25, 2019 | past
Elastic Announces Intent to Acquire Endgame (endgame.com)
5 points by kyrrewk on June 5, 2019 | past
Postmortem: Beating the NATS race (endgame.com)
1 point by megatrontony on Dec 19, 2018 | past
DNS Tunneling – Plight at the end of the tunnel (endgame.com)
1 point by zzflop on Aug 16, 2018 | past
An Introduction to Windows Kernel Debugging (endgame.com)
1 point by dsr12 on April 12, 2018 | past
Detecting Spectre and Meltdown Using Hardware Performance Counters (endgame.com)
105 points by DyslexicAtheist on Jan 11, 2018 | past | 16 comments
Detecting Spectre and Meltdown Using Hardware Performance Counters (endgame.com)
2 points by Cwwm on Jan 10, 2018 | past
Another 0 Day: Protection from a Use-After-Free Vulnerability (2016) (endgame.com)
1 point by tosh on Jan 2, 2018 | past
Endgame Needs a Sr. Front-End Developer (React and Redux Preferred) (endgame.com)
1 point by Endgame_hired on Sept 1, 2017 | past
Ten Process Injection Techniques: A Technical Survey (endgame.com)
1 point by rbanffy on July 18, 2017 | past
The Chakra Exploit and the Limitations of Modern Mitigation Techniques (endgame.com)
1 point by DiabloD3 on March 1, 2017 | past
The Chakra Exploit and the Limitations of Modern Mitigation Techniques (endgame.com)
2 points by remx on Feb 28, 2017 | past
Another 0day (Firefox/Tor), Another Prevention (before execution) (endgame.com)
1 point by zhenjl on Dec 1, 2016 | past
ROP Is Dying and Your Exploit Mitigations Are on Life Support (endgame.com)
2 points by nutate on July 15, 2016 | past
Mitigating Stagefright Attacks with the ARM Performance Monitoring Unit (endgame.com)
24 points by DiabloD3 on June 22, 2016 | past | 6 comments
Your Package Has Been [] Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain (endgame.com)
2 points by moviuro on April 21, 2016 | past
DEFCON Capture the Flag Qualification Challenge (endgame.com)
1 point by sdas7 on Jan 18, 2016 | past
Adobe Flash Vulnerability CVE-2015-7663 and Mitigating Exploits (endgame.com)
38 points by DiabloD3 on Nov 11, 2015 | past | 7 comments
Examining Malware with Python (endgame.com)
9 points by armabiz on July 23, 2015 | past
Could a Hollywood Breach Be the Tipping Point for New Cyber Legislation? (endgame.com)
2 points by Kinetc on Jan 17, 2015 | past
DEFCON Capture the Flag Qualification Challenge #2 (endgame.com)
12 points by borski on June 5, 2014 | past | 1 comment
DEFCON Capture the Flag Qualification Challenge #1 (endgame.com)
109 points by drjohnson on May 25, 2014 | past | 16 comments
DEFCON CTF Qualification Challenge #1 (endgame.com)
2 points by whalesalad on May 22, 2014 | past
Microsoft Win32k NULL Page Vulnerability Technical Analysis (endgame.com)
2 points by lelf on Oct 15, 2013 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: