Prometheus ransomware’s flaws inspired researchers to try to build a near-universal decryption tool

Credit to Author: David Ruiz| Date: Mon, 06 Jun 2022 23:26:16 +0000

Prometheus ransomware contained a weak random number generator that inspired researchers to try and build a one-size-fits-all decryptor.

The post Prometheus ransomware’s flaws inspired researchers to try to build a near-universal decryption tool appeared first on Malwarebytes Labs.

Read more

RSA 2022: Prometheus ransomware’s flaws inspired researchers to try to build a near-universal decryption tool

Credit to Author: David Ruiz| Date: Mon, 06 Jun 2022 23:26:16 +0000

Prometheus ransomware contained a weak random number generator that inspired researchers to try and build a one-size-fits-all decryptor.

The post RSA 2022: Prometheus ransomware’s flaws inspired researchers to try to build a near-universal decryption tool appeared first on Malwarebytes Labs.

Read more

Coronavirus impacts security conferences and events: check your schedule

Credit to Author: Christopher Boyd| Date: Thu, 12 Mar 2020 18:02:04 +0000

We look at upcoming cancellations, postponements, and moves to virtual for security conferences in the wake of the coronavirus pandemic.

Categories:

Tags:

(Read more…)

The post Coronavirus impacts security conferences and events: check your schedule appeared first on Malwarebytes Labs.

Read more

Badgelife: A Defcon 26 retrospective

Credit to Author: Jean Taggart| Date: Wed, 22 Aug 2018 16:03:18 +0000

Another year, another Defcon. In this retrospective, we take a look at the crown jewel of Defcon swag: badges. Reminisce with us about the coolest badges ever made and traded.

Categories:

Tags:

(Read more…)

The post Badgelife: A Defcon 26 retrospective appeared first on Malwarebytes Labs.

Read more

beVX Conference Challenge – HiTB

Credit to Author: SSD / Noam Rathaus| Date: Fri, 22 Jun 2018 11:30:44 +0000

During the event of Hack In the Box, we launched an ARM reverse engineering and exploitation challenge and gave the attendees the change to win great prizes. The challenge was divided into two parts, a file – can be downloaded from here: https://www.beyondsecurity.com/bevxcon/bevx-challenge-10 – that you had to download and reverse engineer and server that … Continue reading beVX Conference Challenge – HiTB

Read more

Exploring the virtual worlds of advergaming

Credit to Author: Christopher Boyd| Date: Thu, 17 May 2018 16:00:53 +0000

With a spot of tracking-related controversy ruffling feathers in gaming circles, now is a good time to become familiar with some of the advertising methods used for, and in, video games. Ladies and gents, welcome to advergaming.

Categories:

Tags:

(Read more…)

The post Exploring the virtual worlds of advergaming appeared first on Malwarebytes Labs.

Read more

beVX Conference Challenge – OffensiveCon

Credit to Author: SSD / Noam Rathaus| Date: Sun, 04 Mar 2018 07:27:05 +0000

During the event of OffensiveCon, we launched a reverse engineering and encryption challenge and gave the attendees the change to win great prizes. The challenge was divided into two parts, a file – can be downloaded from here: https://www.beyondsecurity.com/bevxcon/bevx-challenge-1 – that you had to download and reverse engineer and server that you had to access … Continue reading beVX Conference Challenge – OffensiveCon

Read more

beVX Conference Challenge

Credit to Author: SSD / Noam Rathaus| Date: Sun, 04 Mar 2018 07:27:05 +0000

During the event of OffensiveCon, we launched a reverse engineering and encryption challenge and gave the attendees the change to win great prizes. The challenge was divided into two parts, a file – can be downloaded from here: https://www.beyondsecurity.com/bevxcon/bevx-challenge-1 – that you had to download and reverse engineer and server that you had to access … Continue reading beVX Conference Challenge

Read more