logo logo
  • Tech news
  • Software Resources
  • English
    • 中文 (中国)
    • English
  • Tech news
  • Software Resources
  • English
    • 中文 (中国)
    • English
  1. Home
  2. Cybersecurity
  3. Article list
Clever Hacks
Cryptography
Penetration Testing
Protection Technology
Security Certifications
Security Tools
Vulnerability Analysis
BadUSB Principles and STM32 HID Tutorial (Source Code and GitHub Link)

Hardware Resources BadUSB Principles and STM32 HID Tutorial (Source Code and GitHub Link)

What is BadUSB? Using the STM32F407 development board, we’ll study HID device development and implement a low-cost BadUSB. This article uses the development board for testing. Those with the means can also create a PCB prototype and print the enclosure to create a highly realistic BadUSB.BadUSB is an attack that masquerades as a USB HID…

34 Views 0 Comments
Hardware Resources In the last day
MCP Security Vulnerabilities: Critical Risks Every Developer Must Know

AI Tools MCP Security Vulnerabilities: Critical Risks Every Developer Must Know

MCP adoption is picking up quickly, so I have been digging into the implementations, especially around security and noticed some serious risks that could become disasters if not handled properly. The new MCP 2025-06-18 spec attempts to address some issues but the reality of most servers with boring security debt will bite you when you…

50 Views 0 Comments
AI Tools 4 days ago
Use io-uring to evade security detection and targeted detection.

Vulnerability Analysis Use io-uring to evade security detection and targeted detection.

Background The ARMO research team recently revealed a major flaw in Linux runtime security tools, confirming that the io_uring interface allows rootkits to bypass conventional monitoring schemes, and mainstream tools such as Falco, Tetragon, etc. cannot detect attacks using this mechanism. Additionally, the ARMO team has also open-sourced the io_uring-based rootkit tool – Curing:https://github.com/armosec/curing About…

67 Views 0 Comments
Vulnerability Analysis 2025-08-10
About us

© 2025 IT Resourse Hub