Threat actors abused trusted Trivy distribution channels to inject credential‑stealing malware into CI/CD pipelines worldwide ...
Abstract: Embedded systems are at the heart of critical infrastructure facilities in areas such as energy, transportation, healthcare, defense; where integrity, traceability, and auditability of data ...
Blockchain-based chain of custody system for forensic evidence tracking. Uses SHA-256 hashing and AES-128 encryption to create an immutable, tamper-proof ledger. CLI tool with role-based access ...
High-speed cryptographic liability scanner for WORM compliance. Evaluates data gravity, identifies missing Ed25519 sidecars, and calculates exposure risk against SEC 17a-4 and ESIC chain-of-custody ...