reverse engineering
![satellite](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/12150612/satellite2-400x200.jpg)
Satellites lack standard security mechanisms found in mobile phones and laptops
Researchers from Ruhr University Bochum and the CISPA Helmholtz Center for Information Security in Saarbrücken have assessed the security mechanisms of satellites currently …
![PEtree](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/04121348/blackberry-petree-400x200.jpg)
PE Tree: Free open source tool for reverse-engineering PE files
PE Tree, a malware reverse-engineering, open source tool developed by the BlackBerry Research and Intelligence team, has been made available for free to the cybersecurity …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094946/ghidra-logo-400x200.jpg)
NSA unveils Ghidra reverse engineering tool at RSA Conference 2019
The National Security Agency (NSA) has released Ghidra, a free and cross-platform software reverse engineering tool suite used internally by the intelligence agency. They are …
![Embedi IOActive research](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102217/embedi-ioactive-400x200.jpg)
Researchers uncover major security vulnerabilities in ICS mobile applications
IOActive and Embedi researchers found 147 cybersecurity vulnerabilities in 34 mobile applications used in tandem with SCADA systems. Proof-of-concept Attack on Victim HMI …
![Heartbeat](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195419/heartbeat-400x200.jpg)
Insecure pacemakers can be easily hacked
A group of researchers has discovered that it’s not that difficult for a “weak adversary” with limited resources and capabilities to fiddle with or even shut …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD