String Anti-virus Evasion in x64 Assembly (Part 2)
String Anti-virus Evasion in x64 Assembly (Part 2) by Karlo L In my last blog post, I discussed a way to …
Read MoreString Anti-Virus Evasion in x64 Assembly (Part 1)
String Anti-Virus Evasion in x64 Assembly (Part 1) by Karlo L One of the features I implemented for my Remote Access …
Read MoreAppSec Tales I | Sign-up
AppSec Tales I | Sign-up by Karol Mazurek Application Security Testing of the Register form guidelines. INTRODUCTION This is the …
Read MoreThe Choking effect of Promises and Async-await on your existing Callbacks
The Choking effect of Promises and Async-await on your existing Callbacks by Jaimandeep Singh Your Promise and Async-await may inadvertently …
Read MoreConverting a Malware Dropper to x64 Assembly
Converting a Malware Dropper to x64 Assembly by Karlo L In this post I'll be listing down lessons I learned …
Read MoreWhy Cybersecurity Consultants Are In High Demand
Why Cybersecurity Consultants Are In High Demand A cybersecurity consultant is responsible for identifying vulnerabilities and implementing security measures to …
Read More9 New Cyber Threats and How to Successfully Avoid Them
9 New Cyber Threats and How to Successfully Avoid Them The digital world is vast and seems endless because, at …
Read MoreHoneypots in Endpoint Security and How to Deploy a Honeynet
Honeypots in Endpoint Security and How to Deploy a Honeynet by Gilad David Maayan The article has been originally published …
Read MoreDefence vs Control: Understanding the optimal approach to your cloud security
Defence vs Control: Understanding the optimal approach to your cloud security by Subhalakshmi Ganapathy A cloud environment is not a …
Read MoreGet your mag subscription 22% OFF for Summer ‘22!
Summer ‘22 is just around the corner! We want to celebrate the upcoming sunshine with some special deals for you, …
Read More