Tag: Software
-
QakBot attacks with Windows zero-day (CVE-2024-30051)
In April 2024, while researching CVE-2023-36033, we discovered another zero-day elevation-of-privilege vulnerability, which was assigned …
-
In search of the Triangulation: triangle_check utility
We developed a dedicated utility to scan the iOS backups and run all the checks for Operation Triangulation …
-
How to train your Ghidra
Brief introduction to setting up Ghidra, and then configuring it with a familiar UI and shortcuts, so that you would not need to re-learn …
-
OpenTIP, command line edition
We released Python-based command line tools for our OpenTIP service that also implement a client class that you can reuse in your own …
-
CVE-2022-0847 aka Dirty Pipe vulnerability in Linux kernel
Exploit for CVE-2022-0847 (Dirty Pipe) vulnerability in Linux kernel is available online. Kaspersky solutions detect and prevent …
-
Extracting type information from Go binaries
Go programs may contain hundreds of calls, it is obviously impractical to manually look up each type using a hex editor. So, there is the …
-
GReAT thoughts: Awesome IDA Pro plugins
In the second ‘GReAT Ideas. Powered by SAS’ webinar, I’ll be talking about awesome IDA Pro plugins that I regularly use. This article …
-
Cybersecurity Research During the Coronavirus Outbreak and After
It is about two and half years since we first open-sourced a tool for remote digital forensics called Bitscout. Today, I am happy to …
-
How we developed our simple Harbour decompiler
There were no readily available tools to analyze how the program written in Harbour works. So, we wrote our own. We hope this decompiler …
-
Ransomware: two pieces of good news
Nowadays, cybercriminals have a thousand and one ways of creating and spreading ransomware. However, those fighting ransomware are not …
-
Radisys’ Open 5G Software seed code contribution to accelerate the O-RAN ecosystem
Radisys Corporation, a global leader of open telecom solutions, announced that it is contributing its Open 5G Software seed code to the …
-
1 in 10 open source components downloaded in 2018 had a known security vulnerability
This year’s Sonatype report reveals the best practices exhibited by exemplary open source software projects and commercial application …
●●●