Reverse Engineering x64 for Beginners – Linux
Prologue The main focus of this blog is to give a push start to the beginners to get in the field of reverse engineering. Since […]
Prologue The main focus of this blog is to give a push start to the beginners to get in the field of reverse engineering. Since […]
Welcome to the part 4 of malware development .In the previous parts 1, 2-1, 2-2 and 3, we created a binary which can listen to […]
In the previous parts 1, 2-1 and 2-2 of this series we created a binary that can connect to, and parse commands sent via netcat […]
In the previous parts of this blog series, I introduced the concept of writing a full-undetectable malware and about writing a client-side socket using […]
Welcome to the second part of the malware development blog series. Here’s the link to Part 1. Given the length of Part 2, I have […]
The past 12-18 months we have seen a lot of activity in the area of breach response. We not only launched our Big Data Security […]
If you are a newbie in Penetration Testing and afraid of OSCP preparation, do not worry. Even I was once an amateur before starting on […]
Introduction Over the past few years, bug bounties have begun to garner mainstream attention. With over 150 companies offering their own bug bounty programs and […]
From Our Blog: Data Privacy – An Introduction by Latha Sunderkrishnan (Senior Consultant) When companies and merchants use data or information that is provided or […]
I am pleased to share the story of our growth so far, specifically the progress made by our Security Solutions Division and the Security Operations […]