A Chinese pangolin has been born in the Prague zoo, the first birth of the critically endangered animal in Europe.
Inside the effort to help hundreds of kids orphaned by earthquakes in Turkey and Syria
Hundreds of children in Turkey and Syria who have been orphaned by the recent earthquake. Several aid agencies are trying to help them, but there are a lot of barriers — especially in war-torn Syria.
…
Can AV vendors register code "structure" as signatures?
Hey everyone,
I was just wondering if AV vendors have the possibility to add signatures based on the structure of how a program is set up?
For instance, I’ve recently done some tests on obfuscating the source code of a widely-known RAT found on GitHub. I’ve renamed all of the strings, methods, classes and namespaces. Disabled/commented out some functionality I don’t need, even obfuscated the DLL assemblies as well.
Though for some reason, AV vendors still detect it. Maybe I’m missing a spot in the code where another signature is, or perhaps, it’s the structure of the code itself that’s getting detected?
I don’t know how many vendors use behavioral analysis, but maybe the detection lies in that area of antivirus solutions?
How much obfuscation or code changing is enough for you guys to bypass most AV’s?
submitted by /u/Can_A_Bich
[link] [comments]
Alec Baldwin pleads not guilty to charges of involuntary manslaughter
The actor was due to appear in US court for the first time on Friday.
Street of Russia’s London embassy renamed for Kyiv, painted in Ukraine’s colors
The moves reflect the continued high support for Ukraine in Britain, even as it begins to falter elsewhere.
UN passes non-binding resolution calling for Russia to withdraw from Ukraine
The UN’s General Assembly passed the resolution by a vote of 141-7 with 32 abstentions.
Republicans Double Down on ‘Woke’ Criticism After Army Says Safety Top Recruiting Challenge
A pair of Republican lawmakers is demanding the Army release, in full, survey findings on why young people don’t want to enlist.
Australia pledges drone system for Ukraine, announces additional sanctions on those complicit in Russia’s invasion
submitted by /u/progress18 [link] [comments]
Finding files with R/W permissions in directories you can’t access?
I came across a CTF where you could read another user’s /.ssh/id_rsa but couldn’t interact with anything else in their /home. I only found out about this because I looked up a write up for the CTF. Is there any way to test for something like this? I’v…