Z. Oualid

115 Results / Page 2 of 13

chip

today

close

News + Vulnerabilities Z. Oualid

Qualcomm’s Revelation of High-Severity Vulnerabilities

Qualcomm, a renowned chipmaker, made public additional information about three high-severity security flaws that had fallen victim to “limited, targeted exploitation.” in October 2023. These vulnerabilities not only underscore the perpetual arms race in cybersecurity but also highlight the importance of proactive disclosure and collaborative efforts to address potential threats. ...

Malware artifact/IOC

today

close

SOC + Cybersecurity + Defense + blog Z. Oualid

What are malware artifacts ?

In the intricate landscape of cybersecurity, understanding the concept of malware artifacts is paramount for safeguarding digital environments. All malwares has their own digitale signature that is represented by their artifacts, that can be used to detect them in infected machines. So, what are malware artifacts? Malware artifacts are traces ...

malware analysis books

today

close

blog + SOC + Education Z. Oualid

Top 15 best books on malware analysis

Embarking on the journey of understanding malware analysis is an exciting yet vast undertaking. Getting started with the right books, especially in the early stages, is crucial for a solid foundation. So, which books stand out in the realm of malware analysis? Let’s explore the top 15 books that have ...

today

close

blog + secure coding + Smart contract + Blockchain Security Z. Oualid

Are Blockchains vulnerable?

In a world increasingly shaped by blockchain technology, we often marvel at its security promises. The distributed and decentralized nature of blockchains has revolutionized industries, promising transparency and tamper-proof transactions. However, as we navigate this intricate landscape, it becomes imperative to question: Do these digital ledgers have chinks in their ...

Mobile app vulnerabilities

today

close

blog + secure coding + Website security + OWASP TOP 10 + Mobile app security Z. Oualid

What are the most common mobile apps vulnerabilities?

In the intricate world of mobile app development, where functionality meets vulnerability, understanding the common weak points is key to fortifying your digital creations. As developers and app owners, navigating the landscape of potential threats is a vital aspect of ensuring robust cybersecurity. So, what exactly are the mobile apps’ ...