Security Leftovers
-
Trail of Bits ☛ Fuzzing between the lines in popular barcode software
By Artur Cygan Fuzzing—one of the most successful techniques for finding security bugs, consistently featured in articles and industry conferences—has become so popular that you may think most important software has already been extensively fuzzed. But that’s not always the case.
-
NVISO Labs ☛ How Hey Hi (AI) forces us to expand our thinking about basic cybersecurity concepts: Part 2 – Confidentiality
Introduction In the first part of this mini-series, we explored briefly what kind of impacts Hey Hi (AI) may have on the CIA Triad and whether we should adjust this fundamental framework. The goal of this and subsequent blogposts is assessing the pillars of the proposed Information Security Hexagon, starting with Confidentiality.
-
Pen Test Partners ☛ Mounting memory with MemProcFS for advanced memory forensics
Mounting memory? This changes everything! TL;DR Memory forensics is crucial for investigations, providing access to volatile data, like running processes and network connections.
-
Qt ☛ Preparing for the European Cyber Resilience Act (CRA)
In an era where digital security is paramount, the European Union is taking steps to improve cybersecurity legislation with the introduction of the European Union Cyber Resilience Act (CRA).
-
Latvia ☛ Latvian National Armed Forces invite public to become reservists
The National Armed Forces (NBS) are inviting citizens of Latvia to contribute to the strengthening of Latvia's security by choosing a suitable type of military training and service. One of the ways to get involved in national defense is to take reservist military training.