8 Best Data Science Tools and Software of 2023

Apache Spark and Hadoop, Microsoft Power BI, Jupyter Notebook and Alteryx are among the top data science tools for finding business insights. Compare their features, pros and cons. Continue reading 8 Best Data Science Tools and Software of 2023

Linux X86 Assembly – How To Make Payload Extraction Easier

Overview In the last blog post of the X86 Linux assembly series, we focused on how to make our Hello World payload friendly for use as a payload in exploits.  However, we didn’t cover how to extract the payload itself for use in exploits.  Sure you cou… Continue reading Linux X86 Assembly – How To Make Payload Extraction Easier

LD_PRELOAD: How to Run Code at Load Time

    Today I want to continue the series on using LD_PRELOAD.  In previous posts, we covered how to inject a shared object binary into a process, and use that to hijack a library function call to run our own code.  This is great when we want to overwrit… Continue reading LD_PRELOAD: How to Run Code at Load Time

Digital Offense Capabilities Are Currently Net Negative for the Security Ecosystem

PropositionDigital offense capabilities are currently net negative for the security ecosystem.[0]The costs of improved digital offense currently outweigh the benefits. The legitimate benefits of digital offense accrue primarily to the security one perc… Continue reading Digital Offense Capabilities Are Currently Net Negative for the Security Ecosystem

Converting NMAP XML Files to HTML with xsltproc

NMAP is a wonderful network scanner and its ability to log scan data to files, specifically XML, helps quite a bit.  This enables the scan data to be parsed by other tools such as Metasploit’s db_import or even NMAP’s own Zenmap GUI.  While XML is grea… Continue reading Converting NMAP XML Files to HTML with xsltproc

Steps for PCI DSS Gap Analysis

Complying with Standards drawn by the Payment Card Industry Security Standards Council can be complicated and time-consuming. But, with a PCI DSS Gap Analysis, the process becomes a lot easier, streamlined, and less exhaustive. PCI Gap Analysis is the … Continue reading Steps for PCI DSS Gap Analysis

Five Accelerating Digital Trends That Will Impact Risk Management in 2021

Digital risks escalated in 2020 under the onset of the novel coronavirus and shaped the cybersecurity policy landscape. Over the coming year, we can surmise five accelerating digital trends that will continue to exert their impact on security and human… Continue reading Five Accelerating Digital Trends That Will Impact Risk Management in 2021

MoleRats APT Returns with Espionage Play Using Facebook, Dropbox

The threat group is increasing its espionage activity in light of the current political climate and recent events in the Middle East, with two new backdoors. Continue reading MoleRats APT Returns with Espionage Play Using Facebook, Dropbox