Huawei Firmware Analysis Reveals Security Problems Finite State located significant security issues in Huawei firmware images, including memory corruption, hardcoded encryption keys, and unsafe functions used in place of the secure alternatives. Source: infoq… Read More
Putin’s Hypersonic Weapon Appears to Be a Modified Iskander Ballistic Missile Yesterday’s bizarrely ominous presentation by Russian Vladimir Putin, where he showcased six super weapons that will supposedly give Russia an asymmetric edge over its potential foes—namely the United States—is still reverberating throughout the national security community. After we posted our master recap of the event and the weapons concepts featured in it, we and our… Read More
The Return of Software Vulnerabilities in the Brazilian Voting Machine This paper presents a detailed and up-to-date security analysis of the voting software used in Brazilian elections. It is based on results obtained by the authors in a recent hacking challenge organized by the Superior Electoral Court (SEC), the national electoral authority. Duri… Source: researchgate… Read More
Encryption 101: ShiOne ransomware case study In part one of this series, Encryption 101: a malware analyst’s primer, we introduced some of the basic encryption concepts used in malware. If you haven’t read it, we suggest going back for a review, as it’s necessary in order to be able to fully follow part two, our case study. In this study, we… Read More
Malware Analysis Report: A new variant of Mobef Ransomware A deep analysis of the Mobef ransomware revealed that it implements a number of functionalities, such as the capability to encrypt files, not only on the local drive but also on removable drives and network shares. Source: securityaffairs… Read More