Blog

115 Results / Page 2 of 12

Malware artifact/IOC

today

close

Cybersecurity + Defense + blog + SOC Z. Oualid

What are malware artifacts ?

In the intricate landscape of cybersecurity, understanding the concept of malware artifacts is paramount for safeguarding digital environments. All malwares has their own digitale signature that is represented by their artifacts, that can be used to detect them in infected machines. So, what are malware artifacts? Malware artifacts are traces ...

malware analysis books

today

close

blog + SOC + Education Z. Oualid

Top 15 best books on malware analysis

Embarking on the journey of understanding malware analysis is an exciting yet vast undertaking. Getting started with the right books, especially in the early stages, is crucial for a solid foundation. So, which books stand out in the realm of malware analysis? Let’s explore the top 15 books that have ...

today

close

Blockchain Security + blog + secure coding + Smart contract Z. Oualid

Are Blockchains vulnerable?

In a world increasingly shaped by blockchain technology, we often marvel at its security promises. The distributed and decentralized nature of blockchains has revolutionized industries, promising transparency and tamper-proof transactions. However, as we navigate this intricate landscape, it becomes imperative to question: Do these digital ledgers have chinks in their ...

Mobile app vulnerabilities

today

close

blog + secure coding + Website security + OWASP TOP 10 + Mobile app security Z. Oualid

What are the most common mobile apps vulnerabilities?

In the intricate world of mobile app development, where functionality meets vulnerability, understanding the common weak points is key to fortifying your digital creations. As developers and app owners, navigating the landscape of potential threats is a vital aspect of ensuring robust cybersecurity. So, what exactly are the mobile apps’ ...