Ghidra 101: Loading Windows Symbols (PDB files)

Ghidra 101: Loading Windows Symbols (PDB files)

In this blog series, I will be putting the spotlight on useful Ghidra features you may have missed. Each post will look at a different feature and show how it helps you save time and be more effective in your reverse engineering workflows. Ghidra is an incredibly powerful tool, but much of this power comes from knowing how to use it effectively. The process of transforming source code into application binaries is a lossy process, but at least some…

Read More

Compliance – The Invisible Hand Guiding Cybersecurity

Compliance – The Invisible Hand Guiding Cybersecurity

Have you ever worked with a company that operates as “close to broken” as reasonably possible? Companies that follow that mindset usually do not have the most robust security practice, and they certainly will walk very close to the edge of compliance. Even if you don’t work in such a dysfunctional enterprise as described above, many companies still do not appreciate the interconnection of security and compliance. Both are often considered cost centers, and that paints a…

Read More

Finding Proxylogon and Related Microsoft Exchange Vulnerabilities: How Tenable Can Help

Finding Proxylogon and Related Microsoft Exchange Vulnerabilities: How Tenable Can Help

We urge organizations to patch Proxylogon (CVE-2021-26855) and related vulnerabilities (CVE-2021-26857, CVE-2021-26858, CVE-2021-27065) in Microsoft Exchange Server and investigate for potential compromise within their networks. Here’s how Tenable products can help. Background Following Microsoft’s out-of-band advisory for four zero-day vulnerabilities in Microsoft Exchange Server that were exploited in the wild by a nation-state threat actor known as HAFNIUM, multiple reports have emerged that over 30,000 organizations may have been compromised as a result of these…

Read More

How the Microsoft Exchange hack could impact your organization

How the Microsoft Exchange hack could impact your organization

Cybercriminals are racing to exploit four zero-day bugs in Exchange before more organizations can patch them. Image: Microsoft Organizations that run Microsoft Exchange Server are being urged to apply several bug fixes to the program in response to a hack from a Chinese cybercriminal group. The attack has sparked concern among everyone from security experts to the White House. Early last week, Microsoft revealed that a China-based group called Hafnium has been launching cyberattacks against…

Read More

Virginia Passes New Data Protection Law

Virginia Passes New Data Protection Law

Virginia governor Ralph Northam has signed a new state data protection act into law.  The Virginia Consumer Data Protection Act (CDPA) requires people conducting business in the Commonwealth of Virginia to comply with a novel set of data security and privacy requirements.  The CDPA, which mirrors some of the provisions laid out in the EU’s General Data Protection Regulation (GDPR), comes into effect on January 1, 2023.  Businesses found to have violated the CDPA will…

Read More

Hackers Target Texas University

Hackers Target Texas University

An ongoing network outage at a university in Texas is believed to have been caused by a malicious hack. The computer network of the University of Texas at El Paso was turned off out of caution after a “potentially malicious intrusion” was detected in the early hours of Friday morning. Email and the server hosting the university’s website were affected by the incident, forcing faculty and students to communicate via Blackboard. The cyber-attack has also…

Read More

TiG Acquires ThirdSpace

TiG Acquires ThirdSpace

British tech company TiG Data Intelligence has successfully completed the acquisition of identity and security company ThirdSpace.  ThirdSpace began life in 2002 as Oxford Computer Group UK. The company’s first ever client, University West of England, is still working with them today. Operating as a specialist arm of TiG, ThirdSpace will retain its independent capability and expertise and its current management structure.  “We are delighted to be realising one of ThirdSpace’s strategic goals in expanding our security capabilities…

Read More

REvil Ransomware gang uses DDoS attacks and voice calls to make pressure on the victims

REvil Ransomware gang uses DDoS attacks and voice calls to make pressure on the victims

The REvil ransomware operators are using DDoS attacks and voice calls to journalists and victim’s business partners to force victims to pay the ransom. The REvil/Sodinokibi ransomware operators announced that they are using DDoS attacks and voice calls to victim’s business partners and journalists to force the victims into pay the ransom. The announcement shows an improvement in the double-extortion tactic, which doesn’t limit to threatening the victims to leak the stolen files in case…

Read More

Firefox Total Cookie Protection comes to mobile and desktop versions

Firefox Total Cookie Protection comes to mobile and desktop versions

Jack Wallen explains what supercookies are and how to protect your web browsing against them with Firefox’s new privacy feature. Image: NiroDesign, Getty Images/iStockphoto Mozilla announced recently a new take on privacy for its open source web browser Firefox. This new approach is called Total Cookie Protection and makes a limited exception for cross-site cookies only when they are needed for non-tracking purposes, such as those used by third-party login providers. Outside of that, permissions…

Read More
1 2,366 2,367 2,368 2,369 2,370 2,555