Tag: reverse engineering
-
Hacker News: LLVM-Powered Devirtualization
Source URL: https://blog.thalium.re/posts/llvm-powered-devirtualization/ Source: Hacker News Title: LLVM-Powered Devirtualization Feedly Summary: Comments AI Summary and Description: Yes Summary: The text elaborates on the techniques and methodologies for deobfuscating virtualized binaries, primarily utilizing dynamic taint analysis and LLVM optimization strategies. This study showcases new approaches to reverse engineering obfuscated binaries, which is critical in the context…
-
Cloud Blog: Cloud CISO Perspectives: Ending ransomware starts with more reporting
Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-ransomware-cyber-insurance-reporting/ Source: Cloud Blog Title: Cloud CISO Perspectives: Ending ransomware starts with more reporting Feedly Summary: Welcome to the second Cloud CISO Perspectives for November 2024. Today, Monica Shokrai, head of business risk and insurance, Google Cloud, and Kimberly Goody, cybercrime analysis lead, Google Threat Intelligence Group, explore the role cyber-insurance can play…
-
Cisco Talos Blog: Finding vulnerabilities in ClipSp, the driver at the core of Windows’ Client License Platform
Source URL: https://blog.talosintelligence.com/finding-vulnerabilities-in-clipsp-the-driver-at-the-core-of-windows-client-license-platform/ Source: Cisco Talos Blog Title: Finding vulnerabilities in ClipSp, the driver at the core of Windows’ Client License Platform Feedly Summary: By Philippe LaulheretClipSP (clipsp.sys) is a Windows driver used to implement client licensing and system policies on Windows 10 and 11 systems.Cisco Talos researchers have discovered eight vulnerabilities related to clipsp.sys…
-
Hacker News: Reverse Engineering iOS 18 Inactivity Reboot
Source URL: https://naehrdine.blogspot.com/2024/11/reverse-engineering-ios-18-inactivity.html Source: Hacker News Title: Reverse Engineering iOS 18 Inactivity Reboot Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the new inactivity reboot feature in iOS 18, which adds a significant layer of security by forcing a device reboot after three days of inactivity. This feature aims to protect…
-
Cloud Blog: capa Explorer Web: A Web-Based Tool for Program Capability Analysis
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/capa-explorer-web-program-capability-analysis/ Source: Cloud Blog Title: capa Explorer Web: A Web-Based Tool for Program Capability Analysis Feedly Summary: Written by: Soufiane Fariss, Willi Ballenthin, Mike Hunhoff, Genwei Jiang, Tina Johnson, Moritz Raabe capa, developed by Mandiant’s FLARE team, is a reverse engineering tool that automates the identification of program capabilities. In this blog post…
-
Cloud Blog: LummaC2: Obfuscation Through Indirect Control Flow
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/lummac2-obfuscation-through-indirect-control-flow/ Source: Cloud Blog Title: LummaC2: Obfuscation Through Indirect Control Flow Feedly Summary: Written by: Nino Isakovic, Chuong Dong Overview This blog post delves into the analysis of a control flow obfuscation technique employed by recent LummaC2 (LUMMAC.V2) stealer samples. In addition to the traditional control flow flattening technique used in older versions, the…