Listen

Description

Analyzing JPEG Files

https://isc.sans.edu/forums/diary/Analyzing+JPEG+files/22806/

Auditing Windows With WINspect

https://isc.sans.edu/forums/diary/Windows+Auditing+with+WINspect/22810/

Windows PSSetLoadImageNotifyRoutine Vulnerability

https://breakingmalware.com/documentation/windows-pssetloadimagenotifyroutine-callbacks-good-bad-unclear-part-1/

IOTA Cryptocurrency Vulnerable Hash Function

https://medium.com/@neha/cryptographic-vulnerabilities-in-iota-9a6a9ddc4367