Aggregator
Introducing the Mutator Kit: Creating Object File Monstrosities with Sleep Mask and LLVM
This is a joint blog written by William Burgess (@joehowwolf) and Henri Nurmi (@HenriNurmi). In our ‘Cobalt Strike and YARA: Can I Have Your Signature?’ blog post, we highlighted that the sleep mask is a common target for in-memory YARA signatures. In that post we recommended using the evasive sleep mask option to scramble the [...]
The post Introducing the Mutator Kit: Creating Object File Monstrosities with Sleep Mask and LLVM appeared first on Cobalt Strike.
iOS RE 4 beginners 1 - MachO && class-dump
之前在 iosre看到一张比较系统的iOS逆向学习路线图,因为接触过一段时间macOS上服务的漏洞挖掘,所以对*OS安全还是挺有兴趣的,也一直想系统性地学习下iOS逆向,之前的一直不成体系,也很零碎,正好对着这个图重构下知识体系。
What Is API Detection and Response?
API Security: Best Practices for API Activity Data Acquisition
New Year, New Initiatives for the NIST Privacy Framework!
启明星辰ADLab:工控设备数据安全研究
第1期 | “电子数据取证分析师”报名通道已开启!
USB驱动器无法识别的修复方案
NCSC for Startups: Playing cyber criminals at their own game
密码保护:某国产防泄密沙盒绕过漏洞
大模型会踹破我们的专业门槛吗?
Is the Relationship Between Journalists and Ransomware Gangs Healthy?
One of the most unexpected trends of recent years is the way ransomware has turned high-impact cybercrime incidents into a public spectacle. For ransomware criminals, the more public the better. Extra publicity equals more embarrassment for the victim, which even if it doesn’t result in a ransom being paid serves as a warning to future […]
The post Is the Relationship Between Journalists and Ransomware Gangs Healthy? appeared first on Ransomware.org.