About:

Matt Suiche is a cybersecurity expert and entrepreneur, known for his work in memory analysis and incident response, and co-founder of Comae Technologies and CloudVolumes.

Website:

Specializations:

Interests:

Cybersecurity Memory analysis Incident response Application virtualization Reverse engineering Smart contracts Community development

Outgoing Links:

Schneier on Security
Subscribe to RSS:
The blog post discusses the challenges faced while porting a CUDA Fast Fourier Transform (FFT) implementation to Mojo for the LeetGPU challenge. The main issue was achieving bit-exact precision between CUDA's trigonometric functio...
The blog post discusses RustBPE, a high-performance implementation of Byte Pair Encoding (BPE) tokenization developed by Andrej Karpathy. It highlights the limitations of existing solutions like OpenAI's tiktoken and HuggingFace's...
The blog post discusses the author's journey in optimizing the Triangle Multiplicative Update (TriMul) operation, a critical component in AlphaFold2 and AlphaFold3, which are systems for protein structure prediction. The author, w...
The blog post discusses AMD's Iris, a Python library designed for fine-grained multi-GPU programming in Triton. It addresses the limitations of current multi-GPU programming models, particularly the inefficiencies of bulk synchron...
The blog post discusses CVE-2025-21043, a critical vulnerability in Android's DNG image parser that allows for remote code execution through an exploit leveraging opcode lists in the DNG format. It details the discovery of the vul...
The blog post discusses the phenomenon of nondeterminism in AI systems, particularly in the context of large language models (LLMs) and their responses to identical prompts. It explains how different computation orders in matrix m...
The blog post discusses the challenges in mobile security research, particularly the lack of access to actual exploit samples, which hampers effective threat detection. It introduces ELEGANTBOUNCER, a novel detection tool that ana...
The blog post discusses CVE-2025-43300, a critical vulnerability in Apple's JPEG Lossless Decompression code affecting various Apple devices. This zero-click remote code execution vulnerability allows attackers to exploit inconsis...
The blog post discusses a sophisticated 0-click iMessage attack that exploits a remote code execution vulnerability (CVE-2023-41990) in Apple's FontParser. The attack utilizes a malicious PDF attachment and leverages the undocumen...
The blog post discusses the public release of an email chain regarding a security issue in the WebP open-source project, initially reported by Apple's Product Security team to Google. It highlights the potential impact on the Brot...
The blog post discusses the vulnerabilities associated with the WebP image format and its underlying compression algorithms, particularly focusing on CVE-2023-4863 and CVE-2023-41064. It highlights the significance of robust defen...
The blog post discusses the CVE-2021-30860 vulnerability, known as FORCEDENTRY, which is a sophisticated zero-click exploit targeting macOS/iOS. It highlights the challenges in detecting such exploits due to the lack of publicly a...
The blog post discusses the current state of kernel security, focusing on insights from endpoint security vendors like Sophos and CrowdStrike. It highlights the significance of the Winsock kernel file transfer feature introduced i...
This document analyzes the implementation of AMD GPU support in Triton's Gluon framework, focusing on architectural optimizations, performance characteristics, and the differences between NVIDIA and AMD GPU support. It discusses t...
The blog post discusses the significant impact of a recent CrowdStrike update that affected over 8.5 million Windows devices, highlighting the critical nature of these devices in various services. It explores the historical contex...
The post explores the limitations of cyber warfare in the Iran-Israel conflict, highlighting the impact of drone strikes on cloud infrastructure and the importance of data in the AI economy.
The post outlines how the x402 protocol enables AI agents to make direct micropayments for data, transforming internet economics and data monetization.
The author shares insights from their transition from using PyTorch and CUDA to exploring Triton and Gluon for GPU programming. They highlight the decline in raw CUDA usage in favor of Triton, which offers significant performance ...
The blog post discusses the development of lightweight, open-source AI agents that utilize small language models (SLMs) capable of running on consumer hardware. It emphasizes the importance of designing these agents with constrain...
The blog post analyzes the evolution of financial messaging standards, particularly focusing on the transition from legacy systems like ISO 15022 and ISO 8583 to ISO 20022. It discusses significant cyber incidents, such as the Ban...
This blog post summarizes the CrowdStrike podcast episode featuring Alex Ionescu, discussing the essential role of the Windows kernel in cybersecurity. Key points include the kernel's function as the operating system's 'brain', th...
As the U.S. presidential elections approach, election security is increasingly scrutinized, particularly regarding the vulnerability of digital voting systems to foreign interference, notably from Russia and Iran. Kamala Harris ad...
The author discusses the significance of Rust as a memory-safe programming language during the opening keynote at the POC 2022 conference in Seoul, Korea. Key points include the advantages of Rust for software engineering, its sui...