UPX Packed Headaches

Researching malware has many challenges. One of those challenges is obfuscated code and intentionally corrupted binaries. To address challenges like this, we’ve written a small tool in C that could fix intentionally corrupted binaries automatically. W…

August 23, 2021
Read More >>

The Top 10 Safest Colleges in Texas

College-Bound Freshmen: See Which Colleges are the Safest in Your State in 2020 Living in Texas certainly has its perks. Between year-round warm weather,  a low cost of living, tons of post-college job opportunities, and TexMex everywhere, there a…

August 17, 2021
Read More >>

Tokyo Streaming Traffic Runs Rings Around Rio

With 35 medals at stake, the last full day of competition during the games in Tokyo generated the highest video streaming traffic for 30-plus customers on the Akamai Intelligent Edge Platform. Medal matches for baseball, basketball, and soccer, along w…

August 16, 2021
Read More >>

Defensive Security Podcast Episode 258

https://arstechnica.com/gadgets/2021/07/malicious-pypi-packages-caught-stealing-developer-data-and-injecting-code/
https://arstechnica.com/gadgets/2021/07/feds-list-the-top-30-most-exploited-vulnerabilities-many-are-years-old/
https://www.securityweek….

August 16, 2021
Read More >>

How Businesses Can Utilise Penetration Testing

Understand your security vulnerabilitiesArticle by Beau PetersThe basic approaches like phishing simulations are good, but they tend to have limited reach. This is why more agile methods, penetration testing among them, have been getting incr…

August 13, 2021
Read More >>

HTTP/2 Request Smuggling

HTTP Request Smuggling (also known as an HTTP Desync Attack) has experienced a resurgence in security research recently, thanks in large part to the outstanding work by security researcher James Kettle. His 2019 Blackhat presentation on HTTP Desync att…

August 5, 2021
Read More >>