Consumer Protection RegulationFeatured
A summary of Article 6 requirements for Consumer Protection Regulation (CPR) by the Central Bank of UAE (CBUAE) With the ever-evolving digital landscape and advancements […]
A summary of Article 6 requirements for Consumer Protection Regulation (CPR) by the Central Bank of UAE (CBUAE) With the ever-evolving digital landscape and advancements […]
According to a study by Argon Security, software supply chain attacks grew by more than 300% in 2021 compared to 2020. The study also indicated that attackers […]
Valentine’s Day is approaching fast. And on this day, if anyone is more active than lovers around the world, it is the cybercriminals. Cybercriminals always […]
The end of 2021 brought with it two high-impact events. One was the appearance of the Omicron variant that has led to a resurgence in […]
Prologue In the previous blogpost, we reverse engineered a binary and extracted the password from within it. This binary however contained a plaintext password. This […]
As you might already be aware that ARM powers a variety of low-powered devices around us, including but not limited to, phones, routers, IoT devices, […]
Prologue In the previous blog here, we reverse engineered a simple binary containing plaintext password in Linux with the help of GNU Debugger (GDB). In […]
Prologue The main focus of this blog is to give a push start to the beginners to get in the field of reverse engineering. Since […]
Welcome to the part 4 of malware development .In the previous parts 1, 2-1, 2-2 and 3, we created a binary which can listen to […]
In the previous parts 1, 2-1 and 2-2 of this series we created a binary that can connect to, and parse commands sent via netcat […]