- When I am thinking about the security of manufacturing environments, I am usually focusing on IoT devices integrated into production lines. All the little sensors and actuators are often very difficult to secure. On the other hand, there is also "big software" that is used to manage manufacturing. One example is DELMIA Apriso by Dassault […]
- What can almost 2,000 sextortion messages tell us about how threat actors operate and whether they are successful? Let's find out.
- A user reported a bug in pdf-parser: when dumping all filtered streams, an error would occur:
- Wireshark release 4.4.9 fixes 5 bugs.
- I noticed recently that we have more and more requests for ZIP files in our web honeypot logs. Over the last year, we have had a substantial increase in these requests.
- In most attack scenarios, attackers have to perform a crucial operation: to load a shellcode in memory and execute it. This is often performed in a three-step process: