Showing page 1261 of 1270 of 1750 results.

Blog
99 Problems but Two-Factor Ain’t One. Two-factor authentication is a best practice for securing remote access, but it's also a Holy Grail for any red team.
Blog
APT29 used domain fronting techniques for backdoor access to hide their network traffic. To detect these nation-state attackers requires endpoint visibility, as well as visibility into TLS connections and effective network signatures.
Blog
We have been tracking a campaign this year targeting web payment portals that involves on-premise installations of Click2Gov.
Blog
Understanding the increasingly complex threats faced by industrial and critical infrastructure organizations is not a simple task.
Blog
IDA Pro is popular, so we focus on releasing scripts and plug-ins to help make it more effective at fighting evil.
Blog
Mandiant’s Red Team recently discovered a widespread vulnerability affecting Android devices that permits local privilege escalation to the built-in user “radio”, making it so an attacker can potentially perform activities such as viewing the victim’s SMS database and phone history.
Blog
FireEye’s Mandiant Red Team recently discovered vulnerabilities present on the Logitech Harmony Hub IoT device that could potentially be exploited, resulting in root access to the device.
Blog
We are sharing a new IDAPython library that provides scriptable emulation features to reverse engineers.