Robuta

https://www.arxiv.org/abs/2601.09082
Abstract page for arXiv paper 2601.09082: Rigorous and Generalized Proof of Security of Bitcoin Protocol with Bounded Network Delay
rigorousgeneralizedproofsecuritybitcoin
https://github.com/haven-protocol-org/security-audits/
Repo for Haven Security Audits. Contribute to haven-protocol-org/security-audits development by creating an account on GitHub.
security auditsgithubprotocolorgrepo
https://www.proofpoint.com/au/threat-reference/sstp
SSTP is a common VPN protocol developed by Microsoft. Learn more about the Secure Socket Tunnelling Protocol, how it works, SSTP security, and more.
sstp vpnprotocol securityproofpointau
https://www.smartftp.com/zh-tw/support/kb/2717
The server does not support the TLS security protocol
tls securitysmartftpserversupportprotocol
https://www.incibe.es/en/incibe-cert/blog/security-goose-protocol
The implementation of the IEC 61850 standard in electrical substations was aimed at transforming from the analogue model to the digital model, and thus being...
securitygooseprotocolincibecert
https://www.ibm.com/docs/en/dsm?topic=pco-blue-coat-web-security-service-rest-api-protocol-configuration-options
To receive events from Blue Coat Web Security Service, configure a log source to use the Blue Coat Web Security Service REST API protocol.
blue coatweb securityrest apiconfiguration optionsservice
https://easychair.org/publications/preprint/zQWx
security systemsmtp protocol
https://aws.amazon.com/blogs/security/tag/hls-protocol/
hls protocolaws securityblog
https://bunkerporn.com/security-protocol/
Bunker Security Protocol: secure streaming, encrypted offline storage, and private NAS best practices. Learn VPN + killswitch, TLS 1.3, AES-256, DDoS...
security protocol
https://www.macrumors.com/2024/02/21/apple-announces-imessage-security-upgrade/
Apple today announced a new post-quantum cryptographic protocol for iMessage called PQ3. Apple says this "groundbreaking" and...
security protocolappleannouncesgroundbreakingnew
https://lirantal.com/blog/the-uprising-of-model-context-protocol-mcp-security-research
The Model Context Protocol (MCP) is gaining traction in the AI community, and with its rise comes a wave of security research. This article explores the...
model context protocolmcp securityuprisingresearch
https://www.york.ac.uk/staff/news/2025/cyber-security-month-passwords/
From Facebook or Instagram, online banking apps, work emails and even sensitive research data, all of us rely on passwords to protect both our personal and...
cyber security awarenessmonthpracticegoodpassword
https://www.egyptindependent.com/egypt-russia-flights-to-resume-on-condition-of-signed-security-protocol/
Russian deputy prime minister, Arkady Dvorkovic, stated on Sunday, that his country is waiting to hear from Egypt in regards to airport security protocol and...
egyptrussiaflightsresumecondition
https://threema.com/en/blog/security-proof-ibex
Security Proof of Threema’s Communication Protocol
security proofcommunication protocolthreemarsquondash
https://dblp.org/rec/conf/ccs/MenezesU08.html
Bibliographic details on Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard.
key agreement protocoldblpsecurityarguments
https://www.ainvest.com/news/defi-security-vulnerabilities-systemic-risk-lessons-yield-protocol-3-7m-loss-2601/
DeFi Security Vulnerabilities and Systemic Risk: Lessons from the Yield Protocol $3.7M Loss
security vulnerabilitiessystemic riskdefilessonsyield
https://www.openwall.com/lists/oss-security/2025/12/19/1
osssecurityavahisimpleprotocol
https://www.educative.io/courses/web-application-penetration-testing/http-s-protocol-basics
Learn the fundamentals of HTTP and HTTPS protocols, including their role in web communication and security concerns in web applications.
web securityunderstandinghttpprotocolbasics
https://www.prnewswire.co.uk/news-releases/wire-implements-new-messaging-layer-security-protocol-868488727.html
/PRNewswire/ -- Wire, the world's most secure collaboration platform, is starting to implement the Messaging Layer Security (MLS) protocol into its platform...
messaging layer securitywireimplementsnewprotocol
https://www.alibabacloud.com/blog/alibaba-cloud-service-mesh-faq-3-how-to-configure-tls-protocol-versions-to-enhance-security-in-asm-gateways_600047
Part 3 of this series describes how to configure the TLS protocol version on the ASM gateway to enhance website security.
cloud service meshalibabafaqconfiguretls
https://www.mdpi.com/2073-8994/12/4/579
Protocol stacks specifically designed for the Internet of Things (IoT) have become commonplace. At the same time, security and privacy concerns regarding IoT...
art reviewstatesecurity
https://cantina.xyz/portfolio
Explore Cantina’s protocol security reviews featuring in-depth assessments of both web2 and web3 codebases, led by expert researchers.
protocol securityreviewscantina
https://www.newswire.com/news/national-security-expert-egon-cholakian-breaks-protocol-to-speak-about-22393537
Dr. A. Egon Cholakian, a national security expert and registered federal lobbyist, delivered a landmark video speech in which he presented his in-depth...
national securityexpertegonbreaksprotocol
https://www.rfc-editor.org/rfc/rfc4572.html
connection orientedmedia transportrfclayer
https://www.marktechpost.com/2025/11/16/ai-interview-series-2-explain-some-of-the-common-model-context-protocol-mcp-security-vulnerabilities/
Nov 16, 2025 - AI Interview Series #2: Explain Some of the Common Model Context Protocol (MCP) Security Vulnerabilities. Preparation
ai interviewseriesexplaincommonmodel
https://veriqloud.com/security-of-a-secret-sharing-protocol-on-the-qline/
Jun 7, 2025 - Secret sharing is a fundamental primitive in cryptography, and it can be achieved even with perfect security. However, the distribution of shares requires
secret sharing protocolsecurityqline
https://www.helpnetsecurity.com/2003/02/05/the-advantages-of-block-based-protocol-analysis-for-security-testing/
This paper describes a effective method for black-box testing of unknown or arbitrarily complex network protocols for common problems relating to the
protocol analysissecurity testingadvantagesblockbased
https://www.macrumors.com/2018/06/26/wi-fi-wpa3-security-protocol-certification-starts/
The Wi-Fi Alliance has officially started certifying WPA3, the next-generation security standard for wireless networking devices (via Engadget). The...
wi fi alliancenext generationsecurity protocolbegins
https://www.ladbible.com/news/conor-mcgregor-broke-security-protocol-when-he-met-vladimir-putin-and-20220222
Conor McGregor met Vladimir Putin at the 2018 World Cup Final
conor mcgregorsecurity protocolbrokemetputin
https://www.rfc-editor.org/rfc/rfc5374.html
security architecturerfcmulticastextensions
https://www.helpnetsecurity.com/2009/01/29/sniffer-global-a-new-software-based-portable-protocol-analysis-tool/
The portable protocol analyzer remains a widely used front-line tool that helps to improve real-time troubleshooting with localized provisional visibility
new softwareprotocol analysissnifferglobalbased
https://www.securityinfowatch.com/access-identity/press-release/21228375/hid-global-hid-globals-pki-as-a-service-platform-enables-certificate-automation-with-acme-protocol
Helps customers achieve 100-percent secure web
hid globalservice platformpkienablescertificate
https://citizenlab.ca/2024/10/should-we-chat-too-security-analysis-of-wechats-mmtls-encryption-protocol/
Apr 23, 2025 - This report performs the first public analysis of MMTLS, the main network protocol used by WeChat, an app with over one billion users. The report finds that...
security analysischatencryption
https://flashstart.com/webinar-the-history-of-dns-from-the-birth-of-the-protocol-to-filtered-security/
Jul 10, 2025 - FlashStart: Your secure DNS resolver. Fast and stable with global Anycast network. AI protection against any threat and 24/7 technical support in Italian
webinarhistorydnsbirth
https://www.template.net/editable/145778/it-qa-security-testing-protocol
IT QA Security Testing Protocol Template
qa securitytestingprotocoltemplateword
https://support.abbywinters.com/ufaqs/network-security-what-wifi-security-protocol-am-i-using/
Sep 5, 2025 - B Network security: What wifi security protocol am I using? Permalink Required wifi security protocol If you never connect by wifi (that is, you use a wired...
network securitywifiprotocolusingaw
https://www.civicus.org/index.php/media-resources/news/4367-protecting-our-co-workers-during-covid-19-a-social-security-protocol-for-civil-society
co workerssocial securityprotectingcovid
https://bsvassociation.org/protocol/
Jun 25, 2025 - The BSV protocol stands out through its stability, scalability and security.
blockchain protocolbsvstabilityscalabilitysecurity
https://cantina.xyz/portfolio/8c15e83a-08fc-48b9-8cc1-4f9ca76bb064
Protocol audit for Centrifuge reviewed tranche logic, router flows, and adapter messaging to secure cross-chain lending and on-chain asset operations.
protocol securitycentrifugeauditsummarycantina
https://www.sciencedaily.com/releases/2018/08/180814134201.htm
Researchers have demonstrated that the Internet protocol 'IPsec' is vulnerable to attacks. The Internet Key Exchange protocol 'IKEv1', which is part of the...
internet protocolsecuritygapsidentifiedipsec
https://www.mexc.com/news/384957
The post Critical Network Delay Sparks Security Protocol appeared on BitcoinEthereumNews.com. Upbit Suspends NKN Deposits And Withdrawals: Critical Network...
network delaysecurity protocolcriticalsparksmexc
https://securedrop.org/news/securedrop-protocol-ietf-124/
SecureDrop software engineer Cory Myers and ETH Zurich researcher Felix Linker gave a talk entitled ”SecureDrop — From Design to Analysis” to the Usable...
security analysissecuredropprotocolpresentedietf
https://www.surinenglish.com/spain/iberia-serious-data-breach-20251125080104-nt.html
Nov 25, 2025 - The flag carrier of Spain, which carried a record 31.7 million passengers last year, has reassured customers that their banking details remain secure
iberia airlinedata breachsecurity protocolserious
https://www.tripwire.com/state-of-security/smb-protocol-explained-understanding-its-security-risks-and-best-practices
Server Message Block (SMB) protocol enables users to access remote servers and resources but is often targeted by hackers for unauthorized data and device...
smb protocolsecurity risksbest practicesexplainedunderstanding
https://www.ibm.com/docs/en/dsm?topic=options-security-randori-rest-api-protocol-configuration
To receive events from IBM Security Randori, configure a log source to communicate with the IBM Security Randori REST API protocol.
rest apiconfiguration optionsibmsecurityrandori
https://www.ibm.com/docs/en/connect-direct/6.3.0?topic=protocols-secure-protocol-security-mode
security modesecureprotocol
https://www.gov.uk/government/publications/email-security-standards/using-the-mail-transfer-agent-strict-transport-security-mta-sts-protocol-in-your-organisation
mail transfer agentstrict transport securityusingmtasts
https://www.rfc-editor.org/rfc/rfc7481.html
security servicesdata accessrfcregistrationprotocol
https://www.larksuite.com/en_us/templates/data-security-protocol-for-tech-teams
Free template - Data Security Protocol for Tech: Ensure data security with comprehensive protocols for tech teams
data securityprotocoltechtemplatelark
https://www.myjoyonline.com/security-analyst-warns-protocol-recruitment-eradication-will-not-happen-overnight/
As the Ministry for the Interior moves forward with fresh recruitment into the Ghana Police Service, security expert Emmanuel Kutin has offered a pragmatic...
security analystwarnsprotocolrecruitmenteradication
https://www.alibabacloud.com/blog/alibaba-cloud-service-mesh-faq-3-how-to-configure-tls-protocol-versions-to-enhance-security-in-asm-gateways_600047?spm=a2c65.11461544.0.0.2d2953557E8s2x
Part 3 of this series describes how to configure the TLS protocol version on the ASM gateway to enhance website security.
cloud service meshalibabafaqconfiguretls