The Latest in IT Security

Posts Tagged ‘Obfuscation’

The Blackhole Exploit kit is still a very popular attack on the web. They are many variants of the threat. Here is a detailed analysis of one Exploit kit page and the obfuscation technique leveraged by the attack. In this example, the exploit is heavily obfuscated. The exploit has been encoded and stored as HTML […]

Read more ...

This past weekend one compromised Web site in particular caught my attention. Based on my analysis, the site was compromised because it was running an old version of WordPress (3.2.1) that is vulnerable to publicly available exploits [1] [2]. The Web site injection is only somewhat interesting. What is more interesting is the redirection chain and resulting […]

Read more ...

Senior Reverse Engineer / Reversing Architect Posted: 29 January 2012 Company name: ReversingLabs Location: Boston, MA (No geographic requirement) United States Pay rate: Highly competitive salary Travel: occasionally Poster represents: employer Terms of employment: Salaried employee Hours: full time Onsite: yes Description:ReversingLabs is looking for Senior level Reverse Engineer or Reversing Architect with a strong […]

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments