Skip content

131 140 159 results

Filter by

  • HMRC Phishing Scam

    In the last few days, Nettitude’s threat intelligence platform has picked up a mass phishing campaign – involving...

    Read more
  • McAfee File Lock Driver - Kernel Memory Leak

    McAfee File Lock Driver does not handle correctly IOCTL_DISK_VERIFY IOCTL requests, which leads to kernel memory leak through...

    Read more
  • McAfee File Lock Driver - Kernel Stack Based BOF

    McAfee File Lock Driver does not handle correctly GUIDs of the encrypted vaults, which allows to crash the...

    Read more
  • Pony malware two years later

    Two years after first gaining notoriety, the Pony Botnet remains very active. The malware is primarily targeted at...

    Read more
  • Technical Analysis of ELF/Spylock.A Malware for GNU/Linux

    Nettitude recently obtained a sample of some malware intended to run on GNU/Linux-based servers, with the purpose...

    Read more
  • Malware Manual Unpacking - [Custom + UPX]

    Implementing all sort of methods to bypass anti-virus (AV) scanners and/or to make the analysis of a malware...

    Read more
  • Version Tracking in Ghidra

    When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary’s...

    Read more
  • Vulnerability discovered in unsupported Cisco Systems VPN Client

    An alternative, but no less accurate title to this article would be ‘why you shouldn’t stick with...

    Read more
  • Reducing The Attack Surface: A Human Error Perspective

    The efforts required for a successful cyber-attack do not match the efforts that are invested to build a...

    Read more
  • Cyber Fighting Power – Who Has The Upper Hand?

    Reading through the British Army Military Doctrine manual the other day (as you do!) the concept of Fighting Power in...

    Read more

Error

Error

No results found

No results found that match your query

Loading results