Exploiting Solidity and Smart Contracts via Reentrancy

Checkmarx Research: Solidity and Smart Contracts from a Security Standpoint

This research was provided by Paulo Silva and Guillaume Lopes, who are members of the Checkmarx Security Research Team. Quoting the official documentation, Solidity “is a contract-oriented, high-level language for implementing smart ...
Hijacking Google Pixel Camera Application

2019 – Checkmarx Research Roundup

Discovering vulnerabilities like the ones mentioned below is why the Checkmarx Security Research team performs investigations. This type of research activity is part of their ongoing efforts to drive the necessary changes ...

A Review of Research Identifying the Top Cyber Threats Facing Financial Services

The top cyber threats facing financial institutions range from phishing and privileged misuse – to simply too many cybersecurity tools that are not interoperable according to a review of in-depth research ...

5 Network Security Takeaways from the 2019 Threatscape Report

The new threatscape report by Accenture iDefense highlights five factors shaping the cyberthreat landscape – and we reviewed it to surface those most related to network security ...
Enigma 2019

USENIX Enigma 2019, Max Smeets’ ‘Countering Adversarial Cyber Campaigns’

Thanks to USENIX for publishing the USENIX Enigma 2019 outstanding conference videos on their YouTube Channel Permalink ...
Enigma 2019

USENIX Enigma 2019, Munish Walther-Puri’s ‘Learning From The Dark Web Dimension Of Data’

Thanks to USENIX for publishing the USENIX Enigma 2019 outstanding conference videos on their YouTube Channel Permalink ...
Enigma 2019

USENIX Enigma 2019, Anita Nikolich’s ‘Grey Science’

Thanks to USENIX for publishing the USENIX Enigma 2019 outstanding conference videos on their YouTube Channel Permalink ...
The Five Most Dangerous New Attack Techniques and How to Counter Them

5 Emerging Vectors of Attack and Recommendations for Mitigating the Risks

DNS manipulation, domain fronting, targeted cloud individual attacks, HTTPS and encryption, and the exploitation of hardware features are among the emerging challenges adversaries can exploit according to cybersecurity experts at SANS ...
Navigation Apps: Leading the Way? Or Following You?

Navigation Apps: Leading the Way? Or Following You?

In the United States alone, 84% of adults are using navigation applications, according to a recent Gallup poll. Whether they’re downloading it in an app store or the navigation capability is already ...
 via wehatetowaste.com, original photo credit: Living Green Magazine

Rothman’s Data Security Reset, What To Target And Protect

via wehatetowaste.com, original photo credit: Living Green Magazine via the inimitable Mike Rothman, comes this tour de force research effort targeting of all things - Data Security. In which, the Securosis organization ...