Entry Thumbnail

Quantum readiness: Hybridizing key exchanges

# Quantum readiness: Hybridizing key exchanges Following our previous article on signatures hybridization, this article covers the basics of hybridizing your key exchanges to ensure maximal security of your data. Looking to improve your skills? Discover our **trainings** sessions! Learn more. More urgently than digital signature schemes, the way we […]

Posted by
Entry Thumbnail

Open PLC and Planet vulnerabilities

This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the site owner […]

Posted by
Entry Thumbnail

Depicting an iOS Vulnerability

On March 31, 2025, Apple released iOS 18.4, reportedly fixing 76 vulnerabilities. One of those vulnerabilities was in IOGPUFamily, a kernel driver responsible for handling communication with the GPU. Apple describes the issue as an out-of-bounds write: > IOGPUFamily > > Impact: An app may be able to cause unexpected […]

Posted by
Entry Thumbnail

About

**DARKNAVY**, headquartered in Singapore and Shanghai, is an independent cybersecurity research and services organization. We are pioneers in **AVSS** (Adversarial Vulnerability Scoring System) and **quantitative security**, as well as the founding team behind the international hacking competition GEEKCON. Founded upon the legacy of KeenTeam, established in 2011 and globally recognized […]

Posted by
Entry Thumbnail

LinkPro: eBPF rootkit analysis

# LinkPro: eBPF rootkit analysis During a digital investigation related to the compromise of an AWS-hosted infrastructure, a stealthy backdoor targeting GNU/Linux systems was discovered. This backdoor features functionalities relying on the installation of two eBPF modules, on the one hand to conceal itself, and on the other hand to […]

Posted by