The Latest in IT Security

Posts Tagged ‘image base’

Recently we experimented with our generic unpacking heuristics. Our goal was to unpack a potentially malicious binary and dump the executable from memory to a file. During our experiments we saw a few unknown packers from which we successfully unpacked the binary; with these, however, we dumped the memory but we missed some code in […]

Read more ...

For the last two weeks we have been noticing significant increase of PDF exploit attacks being distributed by email with an attached PDF document posing as a fake invoice.However, closer examination of the PDF file has shown that the exploit uses a two-year-old classified as CVE-2010-0188. Why would anyone use so old an exploit? Well […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments