Tag: reverse engineering

  • CSA: Is AI a Data Security Compliance Challenge?

    Source URL: https://cloudsecurityalliance.org/articles/ai-and-data-protection-strategies-for-llm-compliance-and-risk-mitigation Source: CSA Title: Is AI a Data Security Compliance Challenge? Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the critical intersection of AI technology, particularly large language models (LLMs), with data security and compliance challenges. It emphasizes the necessity for organizations to adapt to evolving regulations like GDPR and…

  • Cloud Blog: capa Explorer Web: A Web-Based Tool for Program Capability Analysis

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/capa-explorer-web-program-capability-analysis/ Source: Cloud Blog Title: capa Explorer Web: A Web-Based Tool for Program Capability Analysis Feedly Summary: Written by: Soufiane Fariss, Willi Ballenthin, Mike Hunhoff, Genwei Jiang, Tina Johnson, Moritz Raabe capa, developed by Mandiant’s FLARE team, is a reverse engineering tool that automates the identification of program capabilities. In this blog post…

  • Cloud Blog: LummaC2: Obfuscation Through Indirect Control Flow

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/lummac2-obfuscation-through-indirect-control-flow/ Source: Cloud Blog Title: LummaC2: Obfuscation Through Indirect Control Flow Feedly Summary: Written by: Nino Isakovic, Chuong Dong Overview This blog post delves into the analysis of a control flow obfuscation technique employed by recent LummaC2 (LUMMAC.V2) stealer samples. In addition to the traditional control flow flattening technique used in older versions, the…