Cracked it! Highlights from KringleCon 5: Golden Rings
Learning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for a crackerjack ride at the North Pole as I foil Grinchum's foul plan and recover the five golden rings
Learning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for a crackerjack ride at the North Pole as I foil Grinchum's foul plan and recover the five golden rings
Make no mistake, counting on a computer is not as easy as it may seem. Here’s what happens when a number gets “too big”.
Ever since the Morris worm, buffer overflows have become notorious fare in the world of vulnerabilities
Taking advantage of the celebration of the Day of the Programmer, we share some audit tools to evaluate the security of your code
Unbeknownst to exploit writers, the seemingly mouth-watering bugs would be bogus and non-exploitable
Recommendations for pentesters looking for security flaws in iOS applications made by developers
One-third of audited codebases that contain Apache Struts suffer from the same vulnerability that facilitated the Equifax hack a year ago
"When looking for vulnerabilities in open-source code, it is advisable to check portions of code that is prone to errors": Useful tips from one of ESET's malware analysts, Matías Porolli, on how to spot vulnerable code.
Lysa Myers, a security researcher at ESET, looks at the diversity challenges and opportunities in information security - while there is much to be done, there's a lot to be optimistic about she says.