Featured Post
Chinese hackers breached Treasury Department workstations, documents in ‘major cybersecurity incident’
Ryan Knappenberger reports: The U.S. Department of the Treasury said on Monday that Chinese-backed hackers had breached its workstations and gained access to unclassified documents earlier this mont…
Cyber Security Agency of Singapore Warns of Exploited Apache Vulnerabilities in 2024
Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor. Enroll Now and Save 10%: Coupon Code MWNEWS10 Note:…
Attack Surface Management (ASM) in 2025: Key Trends to Watch
Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor. Enroll Now and Save 10%: Coupon Code MWNEWS10 Note:…
A Look at CISA Known Exploited Vulnerabilities in 2024
Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor. Enroll Now and Save 10%: Coupon Code MWNEWS10 Note:…
Malware and cryptography 38 - Encrypt/decrypt payload via Camellia cipher. S-box analyses examples. Simple C example
﷽ Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor. Enroll Now and Save 10%: Coupon Code MWNEWS10 Not…
[영화]핫코다산(八甲田山,1977)
오늘은 1902년 핫코다 설중행군 조난사건(八甲田 雪中行軍 遭難事件)을 다루는 영화인 핫코다 산(八甲田山,1977)에 영화에 대해 글을 적어보겠습니다.해당 사건은 1902년 1월 아오모리현의 산악 지역에서 훈련 중이던 일본 제국 육군… Introduction to Malware Binary Triage (IMBT) Course Looking to l…
ValiDrive 프로그램 을 사용 가짜 USB 메모리확인 하는 방법
오늘은 ValiDrive 프로그램을 사용 가짜 USB 메모리 확인하는 방법에 대해 글을 적어보겠습니다.온라인 쇼핑몰 특히 알리 익스프레스,테무 같은 데에서는 가짜 USB 장치 즉 예를 들어서 판매를 할 때에는 1TB… Introduction to Malware Binary Triage (IMBT) Course Looking to level up yo…
AttackRuleMap: Bridging Open-Source Detections and Atomic Tests
Hi there! I wanted to share a project I’ve been working on that connects adversary simulations with open source detection rules. If you’ve ever used Atomic Red Team , you know how valuable it can b…
If you’ve ever worked within security engineering or as an analyst producing any kind of output in…
Qualifying Stakeholder Requirements for Detection Development If you’ve ever worked within security engineering or as an analyst producing any kind of output in a business before, you will certainl…
Newest
Older
Popular posts from this blog
- ICS Patch Tuesday September 2024: Advisories Published by ABB, Siemens, Schneider, CISA
- Ghidra Tip 0x01: Cursor Text Highlighting
- Almost 60% of businesses are ‘very’ to ‘extremely’ concerned about ransomware attacks – hornetsecurity annual ransomware survey
- Distribution of Malicious LNK File Disguised as Producing Corporate Promotional Materials
- The New Frontier: Crafting robust AI Governance in a fast-evolving landscape
- 03 - Identifying Signs of Runtime-Linking and Building Context for API Hashes
- CISA Issues Alert for Juniper Secure Analytics Vulnerabilities (CVE-2023-46604, CVE-2023-40787, CVE-2023-44487, and More)
- Vulnerability in SmodBIP software
- Creating Web App For File Interactions Using RAG: A Developers Guide
- Arm Product Security Update Advisory (CVE-2024-2937, CVE-2024-4607)