Tag: Analysis
-
Solving Ad-hoc Problems with Hex-Rays API
IDA Pro is the de facto standard when it comes to binary reverse engineering. Besides being a great disassembler and debugger, it is …
-
Software Composition Analysis: Reactive Maturity Model
Technology is constantly transforming how your organization is run for the better. You empower stakeholders to make smarter, data-driven …
-
Analysis of 560 incidents demonstrates need for cyber resilience
Many entities face the same types of security incidents – some are viewed as handling the incident well, and for some it’s a disruptive …
-
Analysis: VPN Fail Reveals ‘Guccifer 2.0’ is ‘Fancy Bear’
Evidence continues to mount that Russian intelligence created the “Guccifer 2.0” hacker online persona as a “plausible …
-
PcapXray – GUI Network Forensics Tool To Analysis a Packet Capture Offline
Network Forensics Tool is often used by security professionals to test the vulnerabilities in the network. With this kali Linux tutorial, …
-
DHS, FBI Analysis Uncovers Evidence Russia Is Hacking Power Grid
Today’s topics include the U.S. government accusing Russia of hacking the power grid and Google enhancing mobility security management in …
-
Fast and Complete SSL Scanner to Find Mis-configurations affecting TLS/SSL Severs-A Detailed Analysis
SSLyze Fast and Complete SSL Scanner to find Misconfiguration in the servers configured with SSL. It works with Python 2.7 and …
-
Analysis: NY Attorney General’s Anti-Breach Actions
New York state’s attorney general, Eric Schneiderman, is pushing for changes to the state’s data security and breach notification …
-
New ‘Mac-A-Mal’ Tool Automates Mac Malware Hunting & Analysis
Malware targeting Windows machines still dominates the threat landscape, but hackers gradually have been expanding their target range to …
-
Kaspersky uncovers sophisticated cyber-espionage operation across Africa and Middle East
Researchers have uncovered new malware that has apparently been used to spy on victims in the Middle East and Africa for six years …
-
Analysis suggests North Korea not behind Olympic Destroyer malware attack
A close analysis of the code that took down part of the 2018 Winter Olympics infrastructure appears to show a cunning plan to make it look …
●●●