Explore >> Select a destination


You are here

intezer.com
| | blog.talosintelligence.com
12.3 parsecs away

Travel
| | Cisco Talos discovered a new attack framework including a command and control (C2) tool called "Alchimist" and a new malware "Insekt" with remote administration capabilities.
| | blog.phylum.io
16.8 parsecs away

Travel
| | Phylum continues to discover malware polluting open-source ecosystems. In this blog post, we take a deep-dive into an npm package trying to masquerade as code profiler which actually installs several malicious scripts including a cryptocurrency and credential stealer. Curiously, the attacker attempted to hide the malicious code in a test
| | objective-see.com
5.9 parsecs away

Travel
| |
| | goggleheadedhacker.com
57.8 parsecs away

Travel
| This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application.