• Home
    • News
  • Individuals
    • Students
    • Senior Nevadans
    • Parents & Educators
  • Business
    • Small Business
    • Medium To Large Business
    • Leadership
  • Resources
  • About Us
    • Sponsors
CybersafeNV - CybersafeNV Website

Author: sowerb1


  • Steganography Analysis With pngdump.py: Bitstreams, (Thu, May 1st)
    May 1, 2025

    Steganography Analysis With pngdump.py: Bitstreams, (Thu, May 1st)

    A friend asked me if my pngdump.py tool can extract individual bits from an image (cfr. diary entry “Steganography Analysis With pngdump.py“). It can not. But another tool can: format-bytes.py. In the diary entry I mentioned, a PE file is embedded inside a PNG file according to a steganographic method: all the bytes of a…

    Read More

  • May 1, 2025

    ISC Stormcast For Thursday, May 1st, 2025 https://isc.sans.edu/podcastdetail/9432, (Thu, May 1st)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • April 30, 2025

    ISC Stormcast For Wednesday, April 30th, 2025 https://isc.sans.edu/podcastdetail/9430, (Wed, Apr 30th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • Web Scanning Sonicwall for CVE-2021-20016, (Tue, Apr 29th)
    April 30, 2025

    Web Scanning Sonicwall for CVE-2021-20016, (Tue, Apr 29th)

    There was a post initially published in January 2022 showing an exploitable “probable zero-day vulnerabilities”[1] for Sonicwall but looking back in what has been submitted in the past year to ISC, this past week was the first time we have been getting some reports. The activity occured on the 23 April 2025 between 18:00 –…

    Read More

  • April 29, 2025

    More Scans for SMS Gateways and APIs, (Tue, Apr 29th)

    Last week, I wrote about scans for Teltonika Networks SMS Gateways. Attackers are always looking for cheap (free) ways to send SMS messages and gain access to not-blocklisted numbers. So, I took a closer look at similar scans we have seen.  There are numerous ways to send SMS messages; using a hardware SMS gateway is…

    Read More

  • April 29, 2025

    ISC Stormcast For Tuesday, April 29th, 2025 https://isc.sans.edu/podcastdetail/9428, (Tue, Apr 29th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • April 28, 2025

    ISC Stormcast For Monday, April 28th, 2025 https://isc.sans.edu/podcastdetail/9426, (Mon, Apr 28th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • April 28, 2025

    SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics, (Sun, Apr 27th)

    SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics For digital forensics and incident response professionals, extracting precise evidence from Windows systems is critical to understanding and mitigating threats. I’m excited to introduce SRUM-DUMP Version 3, a powerful forensic tool I’ve developed to analyze the Windows System Resource Usage Monitor (SRUM) database. Available on GitHub at…

    Read More

  • Steganography Analysis With pngdump.py, (Sat, Apr 26th)
    April 26, 2025

    Steganography Analysis With pngdump.py, (Sat, Apr 26th)

    I like it when a diary entry like “Example of a Payload Delivered Through Steganography” is published: it gives me an opportunity to test my tools, in particular pngdump.py, a tool to analyze PNG files. A PNG file consists of a header followed by chunks. pngdump.py shows this (sample c2219ddbd3456e3df0a8b10c7bbdf018da031d8ba5e9b71ede45618f50f2f4b6): The IHDR chunk gives us…

    Read More

  • Example of a Payload Delivered Through Steganography, (Fri, Apr 25th)
    April 25, 2025

    Example of a Payload Delivered Through Steganography, (Fri, Apr 25th)

    In this diary, I’ll show you a practical example of how steganography is used to hide payloads (or other suspicious data) from security tools and Security Analysts’ eyes. Steganography can be defined like this: It is the art and science of concealing a secret message, file, or image within an ordinary-looking carrier—such as a digital…

    Read More

←Previous Page
1 … 31 32 33 34 35 … 49
Next Page→

Our Sponsors

Quick Links

About Us
Individuals
Business
Resources

Contact

Twitter
Facebook
LinkedIn

Copyright © 2022 Cyber Safe NV. All Rights Reserved.