Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
steganography
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
From Pixels to Payload: LSB Steganography and In-Memory Execution
yuribe
yuribe
yuribe
Follow
Mar 28
From Pixels to Payload: LSB Steganography and In-Memory Execution
#
steganography
#
shellcode
#
python
#
cpp
Comments
Add Comment
4 min read
Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 28
Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed
#
cybersecurity
#
steganography
#
supplychain
#
malware
Comments
Add Comment
7 min read
PyPI Compromised: Malicious Code in `telnyx` Packages Leads to Credential Theft and Malware Installation
Artyom Kornilov
Artyom Kornilov
Artyom Kornilov
Follow
Mar 27
PyPI Compromised: Malicious Code in `telnyx` Packages Leads to Credential Theft and Malware Installation
#
security
#
pypi
#
malware
#
steganography
Comments
Add Comment
15 min read
Hide a tree in a forest: a messenger that pretends to be a temperature sensor
telegraph-stego
telegraph-stego
telegraph-stego
Follow
Feb 16
Hide a tree in a forest: a messenger that pretends to be a temperature sensor
#
steganography
#
mqtt
#
iot
#
security
3
 reactions
Comments
Add Comment
7 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account