reverse engineering
![satellite](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/12150612/satellite2-400x200.jpg)
Satellites lack standard security mechanisms found in mobile phones and laptops
Researchers from Ruhr University Bochum and the CISPA Helmholtz Center for Information Security in Saarbrücken have assessed the security mechanisms of satellites currently …
![PEtree](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/04121348/blackberry-petree-400x200.jpg)
PE Tree: Free open source tool for reverse-engineering PE files
PE Tree, a malware reverse-engineering, open source tool developed by the BlackBerry Research and Intelligence team, has been made available for free to the cybersecurity …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094946/ghidra-logo-400x200.jpg)
NSA unveils Ghidra reverse engineering tool at RSA Conference 2019
The National Security Agency (NSA) has released Ghidra, a free and cross-platform software reverse engineering tool suite used internally by the intelligence agency. They are …
![Embedi IOActive research](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102217/embedi-ioactive-400x200.jpg)
Researchers uncover major security vulnerabilities in ICS mobile applications
IOActive and Embedi researchers found 147 cybersecurity vulnerabilities in 34 mobile applications used in tandem with SCADA systems. Proof-of-concept Attack on Victim HMI …
![Heartbeat](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195419/heartbeat-400x200.jpg)
Insecure pacemakers can be easily hacked
A group of researchers has discovered that it’s not that difficult for a “weak adversary” with limited resources and capabilities to fiddle with or even shut …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege