Exploiting Advanced Volatile Memory Analysis Challenges for Fun and Profit

Malware continues to advance in sophistication and prevalence. Well-engineered malware can obfuscate itself from the user, network, and even the operating system running host-based security applications. But one place malware…

3 Min Read

Latest News

Social Networks

Cloud Scanning For Vulnerability Discovery

1 Min Read

The old days are gone. Now we have "the cloud." Attackers have figured out new ways. Join Josh Wright as…

2018 Black Hat: Bypassing MacOS Firewalls

3 Min Read

At a Black Hat 2018, Patrick Wardle, research officer at Digita Security and founder of Objective-See (Mac oriented security company),…