-
Make-Shift Brand Impersonation: Abusing Trusted Domains with Open Redirects
A KnowBe4 Threat Lab publicationAuthors: Daniel Netto, Jeewan Singh Jalal, Anand Bodke, and Martin Kraemer Go to Source
-
From Firewalls to Digital Well-Being: A Whole-School Approach to Online Safety
Recently, I started working with my children’s school to enhance their online safety measures and develop a digital mindfulness course in collaboration with their digital literacy lead. Go to Source
-
Warning: Organizations Need to Prep For AI-Powered Ransomware Attacks
The rise of agentic AI tools will transform the cybercrime landscape, according to a new report from Malwarebytes. Go to Source
-
Your KnowBe4 Compliance Plus Fresh Content Updates from January 2025
Check out the January updates in Compliance Plus so you can stay on top of featured compliance training content. Go to Source
-
Cycles and Cuts in Supersingular L-Isogeny Graphs
ePrint Report: Cycles and Cuts in Supersingular L-Isogeny Graphs Sarah Arpin, Ross Bowden, James Clements, Wissam Ghantous, Jason T. LeGrow, Krystal Maughan Supersingular elliptic curve isogeny graphs underlie isogeny-based cryptography. For isogenies of a single prime degree $ell$, their structure has been investigated graph-theoretically. We generalise the notion of $ell$-isogeny graphs to $L$-isogeny graphs (studied…
-
TallyGuard: Privacy Preserving Tallied-as-cast Guarantee
ePrint Report: TallyGuard: Privacy Preserving Tallied-as-cast Guarantee Athish Pranav Dharmalingam, Sai Venkata Krishnan, KC Sivaramakrishnan, N.S. Narayanaswamy This paper presents a novel approach to verifiable vote tallying using additive homomorphism, which can be appended to existing voting systems without modifying the underlying infrastructure. Existing End-to-End Verifiable (E2E-V) systems like Belenios and ElectionGuard rely on distributed…
-
Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis
ePrint Report: Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis Azade Rezaeezade, Trevor Yap, Dirmanto Jap, Shivam Bhasin, Stjepan Picek Physical side-channel analysis (SCA) operates on the foundational assumption of access to known plaintext or ciphertext. However, this assumption can be easily invalidated in various scenarios, ranging from common encryption modes like Cipher Block Chaining…