The SEC has introduced a new rule requiring public companies to be more transparent about material cybersecurity incidents, requiring disclosure…

Buffer overflow
Can fuzzing uncover unexplored vulnerabilities in winrar?
• RAR, or WinRAR in its contemporary Windows form, has been popular in file sharing and software distribution circles for…

Recent News
Can you trust your smart light bulb?#cryptography #security
of security. Security is like a light bulb: you can trust it to light your way, but you must be…

Recent News
What secrets does volatility workbench unravel in memory forensics? #malware #memory
. Memory forensics is like a detective searching for clues to solve a mystery. The volatility workbench is the magnifying…

Recent News
Is at&t alien labs the best threat intelligence in cybersecurity? #awards #otx
. Threat intelligence in cybersecurity is like a prestigious award ceremony. Just like the award winners at the ceremony are…

BitLocker
Is your active directory implementation on windows server 2019 secure? #cybersecurity #ad
. It’s like building a house on a foundation of sand; if your active directory implementation isn’t secure, it won’t…