• Trends
  • Topics
  • Nodes
Search for keywords, #hashtags, $sites, add a dash to exclude, e.g. -$theonion.com

From nviso.eu

NVISO analyzes BRICKSTORM espionage backdoor

0 0

BRICKSTORM is an espionage backdoor linked to China-nexus cluster UNC5221, targeting European industries since at least 2022.

on Apr 15

From nviso.eu

BitLocker Security: Are Your Keys Truly Safe?

0 0

Explore the security of BitLocker and TPM. Learn how attackers might access your data and how to enhance protection with pre-boot authentication.

on Nov 28

From nviso.eu

Home

0 0

Ihre Cyber Security Experten | Schutz vor Cyberangriffen | Security Design, Monitoring, Incident Response | Ethical Hacking & Cloud Security

on Oct 9

From nviso.eu

Punch Card Hacking – Exploring a Mainframe Attack Vector

0 0

Mainframes are the unseen workhorses that carry the load for many services we use on a daily basis: Withdrawing money from an ATM, credit card payments, and airline reservations to name just a few …

on Jul 22

From nviso.eu

Enforcing a Sysmon Archive Quota

0 0

This blog post will create a Sysmon archive quota through WMI event consumption to avoid storage exhaustion.

on Apr 9, 2024

From nviso.eu

Covert TLS n-day backdoors: SparkCockpit & SparkTar

0 0

This report documents two covert TLS-based backdoors identified by NVISO: SparkCockpit & SparkTar.

on Mar 2, 2024

From nviso.eu

Deobfuscating Android ARM64 strings with Ghidra: Emulating, Patching, and Automating

0 0

In a recent engagement I had to deal with some custom encrypted strings inside an Android ARM64 app. I had a lot of fun reversing the app and in the process I learned a few cool new techniques whic…

on Mar 1, 2024