Blog

From Lexical to Semantic: Advancements in AI-Driven Text Search

The quest for more accurate and meaningful information retrieval has led to significant advancements in search technologies.[…]

AI Research: Text To Image Search Systems

Text-to-image search represents a significant advancement in how we interact with visual data, moving beyond traditional keyword-based[…]

AI Research: Radio Frequency (RF) Signal Image Classification Dataset

Recently I released Version 1 of the Radio Frequency Signal Classification Dataset on Kaggle. The Radio Frequency[…]

Zero-Day Research: 7 CVEs in Libforth

Every month I routinely conduct thorough fuzz testing on various open source libraries to uncover hidden vulnerabilities[…]

Unleashing AI Genies: The Magical Art of Prompt Engineering

Imagine you have a magic notebook that can answer any question you write in it. It doesn’t[…]

Zero-Day Research: A Journey Through Lambda Calculus

Introduction In the realm of computer science, abstract concepts often find practical applications. The Lambda Calculus Interpreter[…]

Zero-Day Research: CVE-2024-22088 Lotos HTTP Server Use-After-Free

In the realm of cybersecurity, uncovering vulnerabilities is a critical part of securing software applications. Recently, while[…]

Zero-Day Research: CVE-2024-22087 Pico HTTP Server in C Remote Buffer Overflow

Introduction Buffer overflows are a common and potentially devastating vulnerability in computer systems and applications. In this[…]

Zero-Day Research: CVE-2024-22086 Cherry HTTP Server Remote Buffer Overflow

Introduction Remote buffer overflows stand out for their notoriety and the sheer impact they can have on[…]

Zero-Day Research: CVE-2023-51771 MicroHTTPServer Off-By-One Global Buffer Overflow

Unraveling a Subtle Yet Critical Vulnerability In the ever-evolving landscape of cybersecurity, certain vulnerabilities, though seemingly minor,[…]