- YARA is an excellent tool that most of you probably already know and use daily. If you don't, search on isc.sans.edu, we have a bunch of diaries about it[1]. YARA is very powerful because you can search for arrays of bytes that represent executable code. In this case, you provide the hexadecimal representation of the […]
- When I am thinking about the security of manufacturing environments, I am usually focusing on IoT devices integrated into production lines. All the little sensors and actuators are often very difficult to secure. On the other hand, there is also "big software" that is used to manage manufacturing. One example is DELMIA Apriso by Dassault […]
- What can almost 2,000 sextortion messages tell us about how threat actors operate and whether they are successful? Let's find out.
- A user reported a bug in pdf-parser: when dumping all filtered streams, an error would occur:
- Wireshark release 4.4.9 fixes 5 bugs.