Research / High Tech

Reverse Engineering is Not Hard with LLM Powered Tools

Reverse Engineering is Not Hard with LLM Powered Tools

With the advent of LLM-powered tools, the intricate task of reverse engineering compiled software is becoming more manageable, allowing newcomers and seasoned professionals to navigate the process more easily. First Published 9th April 2024 The reversing engineer. 4 min read | Reflare …

Read Story

Is Your CPU Leaking Sensitive Data?

Is Your CPU Leaking Sensitive Data?

In a recent turn of events, Intel and AMD are once again under the cybersecurity spotlight, with critical vulnerabilities found in their CPUs, challenging the notion of hardware-level security in modern computing.

Read Story

Exploring Data Science and Machine Learning the Cybersecurity Way

 Exploring Data Science and Machine Learning the Cybersecurity Way

Focusing on the dynamic interplay between artificial intelligence and cybersecurity, we cast an eye over some of the more valuable projects in the areas of malware detection and software vulnerability analysis.

Read Story

AI Enabled Cybersecurity Lunges Towards the Future

AI Enabled Cybersecurity Lunges Towards the Future

Recent developments in artificial intelligence are now making its practical application more accessible to real-world challenges, including cybersecurity. You now must ask yourself, "Do I know how to use it correctly?"

Read Story

The Leyman's Guide to Fuzzing

Fuzzing can (among other things) be used to expose software bugs, test browser security, and perform static program analysis. However, as the types of fuzzers continue to expand, so do their use cases.

Read Story

Artificial Intelligence and Malware Detection

Artificial Intelligence and Malware Detection

The term 'artificial intelligence' is no longer a mere buzzword in the antivirus industry. But does it mean it is the holy grail for malware detection or the perfect weapon against malware developers? Not quite.

Read Story

A Look at the Most Attacked Ports

A Look at the Most Attacked Ports

Although the number of attacks against most ports remains relatively low, it is critical to understand which ones are the most targeted. You should conduct a rigorous audit, evaluate your own exposure, and act accordingly... or else.

Read Story

Cryptocurrencies, 51% and the Future of Botnets

In spite of several innovative and complementary alternative decentralised financial applications being built using blockchain technology, cryptocurrencies still struggle for mainstream adoption. One of the reasons for this is a tendency for security scares resulting from apparent cri …

Read Story

The Root of Security Bugs

The Root of Security Bugs

Even the giants can get it wrong. In November of 2017, Mac users running the then newest incarnation of Apple’s operating system — macOS High Sierra, which was released only a month before — were open to attack. The bug allowed anyone with access to the computer to log in as the “root …

Read Story

New Hacking Techniques Targeting Car Keys

It has been proven that hackers can communicate with the encrypted logic of a car's key fob to force it to unlock vehicles. What's more, these keys can be cloned and duplicated using off-the-shelf equipment, allowing anyone to open and drive a vehicle without the keys or validating au …

Read Story

Subscribe by email