Binary Ninja Plugin 18 Sep 2024 Recently, in response to a customer incident we needed to reverse engineer a malware sample of WhiteRabbit ransomware... Read more
This Badge is My Badge 28 Aug 2024 When it comes to covert entry assessments, successfully capturing RFID badge values can mean the difference between failure... Read more
Version Tracking in Ghidra 9 Aug 2024 When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary’s... Read more
Penetration Testing 7 Aug 2024 We are looking for passionate and skilled penetration testers with professional experience. There are multiple roles available... Read more
Accelerator Program 7 Aug 2024 Do you want a job in cyber security but don’t know how to break into the industry? Tired... Read more
CVE-2018-13442: SolarWinds NPM SQL Injection 7 Aug 2024 A SQL injection vulnerability has been discovered in SolarWinds’ Network Performance Monitor (NPM). This vulnerability has been designated... Read more
Vulnerabilities in AI Agents 25 Jul 2024 LLMs are becoming increasingly accessible to everyone. It is very easy to create your own LLM system, however... Read more
Detecting PoshC2 - Indicators of Compromise 17 Jun 2024 As a counterpart to the release of PoshC2 version 6.0 we are providing a list of some of... Read more
Flaw in PuTTY P-521 ECDSA signature generation leaks SSH... 16 Apr 2024 This article provides a technical analysis of CVE-2024-31497, a vulnerability in PuTTY discovered by Fabian Bäumer and Marcus Brinkmann... Read more
Introducing SharpConflux 27 Mar 2024 Today, we are releasing a new tool called SharpConflux, a .NET application built to facilitate Confluence exploration. It... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*