This is where the cutting-edge research will be made available. You can expect to see the following categories here:
- Linux
- Windows
- Mobile devices
- Hardware and software
- Wireless technologies
- Virtualisation with the focus on virtual machine escapes and hypervisor level exploits
- Exploit development
- Discovered 0-day vulnerabilities
- New techniques and exploit development methods
- Web application, database and infrastructure related research
- Cloud security
All relevant research related posts are listed below: