Remove 01
Remove 2022 Remove Data Remove Education Remove Information Security
article thumbnail

Malicious file analysis – Example 01

Security Affairs

Cyber Security Specialist Zoziel Pinto Freire shows an example of malicious file analysis presented during his lecture on BSides-Vitória 2022. My objective with this series of articles is to show examples of malicious file analysis that I presented during my lecture on BSides-Vitória 2022. Example 01 – Static Analysis.

Libraries 103
article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Thu, 01/12/2023 - 05:54. If you have already watched them, repetition is the mother of all education. Fasten your seatbelts and enjoy the Top 5 list of Thales webinars for 2022.

article thumbnail

CISA adds TP-Link, Apache, and Oracle bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

The vulnerability was first reported to ZDI during the Pwn2Own Toronto 2022 event. Working exploits for LAN and WAN interface accesses were respectively reported by Team Viettel and Qrious Security. CVE-2021-45046 (CVSS score: 9.0) – Apache Log4j2 deserialization of untrusted data vulnerability.

IT 91