LRQA Nettitude Blog

Context Triggered Piecewise Hashing To Detect Malware Similarity

Posted by Tom Wilson on Jun 30, 2015

At Nettitude we collect a large amount of malware binary samples, both from our Honeypot network, from our customers and from incident response. One of the first steps we take is to calculate the MD5 hash of the malware and compare this hash to known samples, while unknown samples can be examined further by an analyst.

Read More

Topics: Security Blog, Uncategorized

The Prestige in Malware Persistence

Posted by Kyriakos Economou on Jun 16, 2015

Introduction

Read More

Topics: Security Blog, Uncategorized

Eight Things To Consider Before Deploying Cyber Threat Intelligence

Posted by Jules Pagna Disso and Tom Wilson on Jun 6, 2015

Protecting against cyber-attacks is proving to be a real challenge. A few years ago, defence in depth was the recommended methodology to successfully fight cyber-attacks. Despite the proliferation of defence in depth mechanisms, a large number of high profile cyber-attacks are still observed. It's no surprise to anyone that all sensible business owners and world leaders are seriously worried about the impact of successful cyber-attacks against their environment. According to a survey by Forrester’s Foresights Security Survey in 2013, 75% of 490 companies agreed that cyber threat intelligence was a priority.  The recent report “2015 Global Megatrends in Cybersecurity” sponsored by Raytheon suggest that most companies will deploy cyber threat intelligence over the next three years as a measure against cyber-attacks.

Read More

Topics: Security Blog, Uncategorized

CSRF And Unsafe Arbitrary File Upload In NextGEN Gallery Plugin (2.0.77.0) For WordPress

Posted by Louie Augarde on Mar 25, 2015

1      Introduction

Please note the vulnerability detailed in this blog article was first discovered on Monday 9th March 2015, disclosed and discussed with the company concerned on March 10th and a patch was released on March 12th.

Read More

Topics: Security Blog, Uncategorized

Windows Inline Function Hooking

Posted by Tom Wilson on Mar 18, 2015

Hooking can be used by legitimate software for reverse engineering, for example, to examine the user mode function calls that a malicious program is making.

Read More

Topics: Security Blog, Uncategorized

DLL Injection: Part Two

Posted by Tom Wilson on Mar 4, 2015

In a previous blog post I gave a high level overview of DLL injection, what it is used for and how it might be achieved.

Read More

Topics: Security Blog, Uncategorized

DLL Injection: Part One

Posted by Tom Wilson on Feb 25, 2015

A High Level Overview

Read More

Topics: Security Blog, Uncategorized

Traditional Wireless Vs. Cloud Wireless Solutions

Posted by Indy Sogi on Feb 19, 2015

In this blog post, I will discuss how a cloud-based architecture makes wireless local area network (LAN) easier and more affordable compared with traditional wireless LAN architecture.

Read More

Topics: Security Blog, Uncategorized

A Beginners’ Guide to Obfuscation

Posted by Sam Baker on Feb 11, 2015

Obfuscation is a technique used to change software code in order to make it harder for a human to understand. There are several reasons one might obfuscate code:

Read More

Topics: Security Blog, Uncategorized

Bypassing AV The Easy Way

Posted by Jules Pagna Disso and Tom Wilson on Dec 11, 2014

During the recent BSIDES conference (2014), which was hosted in Las Vegas, Kyle Adams presented on "Evading code emulation: Writing ridiculously obvious malware that bypasses AV":

Read More

Topics: Security Blog, Uncategorized

Subscribe Here!

About LRQA Nettitude

Through our connected portfolio of advanced cybersecurity solutions, LRQA Nettitude helps companies to identify and manage the vulnerabilities and threats that pose a risk to their business, building cybersecurity resilience and underpinning your business strategy with proactive measures.

Recent Posts

Posts by Tag

See all