Aggregator
Signaturing an Authenticode anomaly with Yara
1 year 2 months ago
Singularity of Origin
1 year 2 months ago
Slotting Security into Corporate Development
1 year 2 months ago
Sifting through the spines: identifying (potential) Cactus ransomware victims
1 year 2 months ago
Sign over Your Hashes – Stealing NetNTLM Hashes via Outlook Signatures
1 year 2 months ago
Shocker
1 year 2 months ago
Shooting Yourself in the .flags – Jailbreaking the Sonos Era 100
1 year 2 months ago
SIAM AG23: Algebraic Geometry with Friends
1 year 2 months ago
Shining the Light on Black Basta
1 year 2 months ago
Shining New Light on an Old ROM Vulnerability: Secure Boot Bypass via DCD and CSF Tampering on NXP i.MX Devices
1 year 2 months ago
Shell Arithmetic Expansion and Evaluation Abuse
1 year 2 months ago
Shellshock Advisory
1 year 2 months ago
Shellshock Bash Vulnerability
1 year 2 months ago
Sharkbot is back in Google Play
1 year 2 months ago
SharkBot: a “new” generation Android banking Trojan being distributed on Google Play Store
1 year 2 months ago
Shaking The Foundation of An Online Collaboration Tool: Microsoft 365 Top 5 Attacks vs the CIS Microsoft 365 Foundation Benchmark
1 year 2 months ago
Setting a New Standard for Kubernetes Deployments
1 year 2 months ago
SETTLERS OF NETLINK: Exploiting a limited UAF in nf_tables (CVE-2022-32250)
1 year 2 months ago
Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond
1 year 2 months ago