A guide to starting the PCI DSS process 24 Nov 2015 A Guide to Starting the PCI DSS Process Read more
Pony malware two years later 22 Oct 2015 Two years after first gaining notoriety, the Pony Botnet remains very active. The malware is primarily targeted at... Read more
Technical Analysis of ELF/Spylock.A Malware for GNU/Linux 7 Oct 2015 Nettitude recently obtained a sample of some malware intended to run on GNU/Linux-based servers, with the purpose... Read more
Malware manual unpacking - [custom + upx] 5 Oct 2015 Malware Manual Unpacking - [Custom + UPX] Read more
Malware Manual Unpacking - [Custom + UPX] 5 Oct 2015 Implementing all sort of methods to bypass anti-virus (AV) scanners and/or to make the analysis of a malware... Read more
Version Tracking in Ghidra 4 Oct 2015 When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary’s... Read more
Vulnerability discovered in unsupported Cisco Systems VPN Client 1 Oct 2015 An alternative, but no less accurate title to this article would be ‘why you shouldn’t stick with... Read more
CVE-2015-5227: zeropress and remote code execution in the Wordpress... 30 Sep 2015 CVE-2015-5227: Zeropress and Remote Code Execution in the Wordpress Landing Pages Plugin Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*