Introduction IDA Pro is the de facto standard when it comes to binary reverse engineering. Besides being a great disassembler and debugger, it is possible to extend it and include a powerful decompiler by purchasing an additional license from
In 2017, Mandiant responded to multiple incidents we attribute to FIN7, a financially motivated threat group associated with malicious operations dating back to 2015. Throughout the various environments, FIN7 leveraged the CARBANAK backdoor,
In this post we are going to take a quick look at what it takes to write a libemu compatibility layer for the Unicorn engine. In the course of this work, we will also import the libemu Win32 environment to run under Unicorn.
For a bit of
Security information and event management (SIEM) tools have been around for some time. Yet, as the instruments of threat actors mature, tools to combat them must advance even faster.
Many SIEMs from your Computer Information Science professor’s
FireEye's Innovation and Custom Engineering (ICE) team released a tool today called GoCrack that allows red teams to efficiently manage password cracking tasks across multiple GPU servers by providing an easy-to-use, web-based real-time UI
Over the past few years, the ever-evolving cyber threat landscape and
the dire and impactful consequences of cyber attacks has led to large-scale
cyber attacks and data fraud ranking in the top five of most
likely risks worldwide. Despite
Cyber criminals and hackers can create chaos in state and local
voting and election systems – from disqualifying voters to corrupting
data to launching denial-of-service attacks.
For example, last summer 12 Russians were indicted by the
Has Apple taken a bite out of hackers’ arsenals? The company is betting on it. Its recent announcement about a new secure payment option has the retail and tech worlds buzzing. If Apple can implement its near-field communication (NFC) payment
The goal of communicating cyber security topics with senior
executives and boards is to help them understand the top cyber
security concerns, the impacts to the business and possible mitigation
approaches so they can establish priorities and
When Daniel Bohannon released his excellent DOSfuscation paper, I was fascinated to see how tricks I used as a systems engineer could help attackers evade detection. I didn’t have much to contribute to this conversation until I had to analyze a