Summary The REvil ransomware (a.k.a Sodinokibi) is a threat group that operates in the RaaS (Ransomware-as-a-Service) model, where the…
Code
The process of writing code and delivering it to AWS Lambda is as straightforward as making a…
Programming language memory models answer the question of what behaviors parallel programs can rely on to share…
On October 25th, I found a bug in the Anti-Exploit driver of Malwarebytes v3.6.1.2711 that caused BSOD and finally…
VMware is actively exploiting a vulnerability with a severity rating of 9.8 out of 10. At least…
For companies running their own datacenter, setting up internal DNS infrastructure is essential for performance and ease…
Although the main interface between applications and a Vitess database is through the MySQL protocol, Vitess is…
It was launched in January of 2020, when we made the fly “hemibrain” connectome available on the…
Released back in 2013, VeraCrypt picks up where TrueCrypt left off. Supporting more encryption algorithms, more hash…
Cloudflare Tunnel allows you to connect applications securely and quickly to Cloudflare’s edge. With Cloudflare Tunnel, teams…
A lot of JavaScript that runs in the browser nowadays runs quicker than it did two decades…
Prosus, the company which develops online programming education programmes, said that it has inked a deal to…
Writing assembly is itself an art. When C, C++, or any other language is compiled, the compiler…
API gateways are an integral part of microservices architecture in recent years. An API gateway provides a…
The run-time speed and memory usage of programs written in Rust should about the same as of…
Database systems typically give users the ability to trade off correctness for performance. In distributed systems, there…
Say you run an online book store and want to build a data pipeline that figures out…
For those who don’t follow Swift’s development, ABI stability has been one of its most ambitious projects…
In a time full of ransomware as well as Advanced persistent Thread (APT) incidents the importance of…
This article series will be a summary of about a decade of unpublished research I am trying…
A couple of years ago I participated in a red-team exercise with a company involved in hardware…
This blog post is an in-depth dive into the security features of the Intel/Windows platform boot process….
A while ago, I’ve been working on a very large codebase that consisted of a few million…
Proof of concept …for a C# binary that When executed… Executes an encrypted payload in memory without…
I love when my current problem can be solved with a state machine. They’re fun to design…
In his classic paper How to Build a Highly Available System Using Consensus Butler Lampson laid out a pattern…
In what’s a novel supply chain attack, a security researcher managed to breach over 35 major companies’…
In light of the recent SolarWinds supply chain attack, I decided to take a quick look at…
This post is about a VirtualBox VM escape exploit that existed in VirtualBox 6.1.16 on Windows. Many…
Contents hide 1 Key Takeaways 2 The Web Handler 3 Always Measure 4 First Iteration 5 Immutability…