Fault Injection in Diagnostic Protocols

Fault Injection in Diagnostic Protocols

Click the blue text above to follow us / Technical Exchange Group/ Add WeChat 15021948198 to apply for membership to download PPT & join the automotive network information security, testing evaluation, automotive electronics, autonomous driving technology exchange group, recruitment job-seeking group, investment and financing cooperation group… Related Articles [Grab Your Spot] Countdown! The 8th Information … Read more

Tor’s New Encryption Algorithm Enhances Anonymity

Tor's New Encryption Algorithm Enhances Anonymity

Renowned for its anonymity, the Tor browser team is striving for the pinnacle in the pursuit of encryption keys that are difficult to crack. To generate such keys, it is necessary to innovate and upgrade the random algorithms. For those unfamiliar with encryption keys and random algorithms, let’s first review these two concepts. A key … Read more

Practices of SDP in Networking

Practices of SDP in Networking

Click the blue words to follow us In today’s cybersecurity field, SDP is a hot topic. SDP (Software Defined Perimeter) is a security framework developed by the Cloud Security Alliance, based on the concept of zero trust. Every terminal connecting to the server must undergo authentication and authorization before connection, ensuring the trustworthiness of all … Read more

How to DIY an Attack Surface Management Solution

How to DIY an Attack Surface Management Solution

Recently, major companies such as Industrial and Commercial Bank of China, Boeing, and Dubai Ports World have suffered ransomware attacks due to their failure to promptly fix high-risk vulnerabilities or misconfigurations of exposed assets, highlighting the importance of Attack Surface Management (ASM). According to Sevco’s latest “2023 Enterprise Attack Surface Survey Report”, 11% of enterprise … Read more

Application and Challenges of Off-The-Shelf Software in Medical Devices

Application and Challenges of Off-The-Shelf Software in Medical Devices

With the intelligence and informatization of medical devices, many off-the-shelf software (OTS) are being applied in medical devices. On August 11, 2023, the FDA released the Guidance for Industry and Food and Drug Administration Staff on Off-The-Shelf Software Use in Medical Devices, which aims to provide information that applicants should include in the documentation submitted … Read more

Two New Points in Automation: Changes Brought by IoT (Part One: Embedded Device Security, Old Soldiers with New Stories, Relating to IIoT Security)

Two New Points in Automation: Changes Brought by IoT (Part One: Embedded Device Security, Old Soldiers with New Stories, Relating to IIoT Security)

Introduction Industrial automation consists of two parts: networking and interconnection of devices, and the design and manufacturing of embedded devices. The development of the Internet of Things (IoT) poses challenges to the interconnectivity and information security of factory, industrial facilities, and service equipment. Previously, when devices were not connected to the internet, everything was safe; … Read more

Advanced Threat Intelligence Analysis

Advanced Threat Intelligence Analysis

2024.12.13~12.19 Attack group intelligence Mask APT reappeared, targeting Latin American organizations. Attack Bitter APT utilized WmRAT and MiyaRAT malware to attack Turkish defense organization APT-C-36 (Blind Eye Eagle), continuously launching attacks against Colombia. Gamaredon deployed in former Soviet states Andr…

Emergency Response Procedures for Cybersecurity Incidents

Emergency Response Procedures for Cybersecurity Incidents

Emergency Response Steps: 1. Focus on ensuring business stability. Blacklist IP, rate limit, human verification code. First, activate the operational emergency plan to ensure stable business operation and system stability (network, system files, startup items, libraries, memory). Experience is irreplaceable. Think about security incidents with an event correlation mindset. All operations must be recorded with … Read more

Common Security Threats and Protection Measures for Embedded Systems

Common Security Threats and Protection Measures for Embedded Systems

Embedded engineers should enhance their understanding of system security, comprehend the essence of security threats, and master effective protection strategies. Through in-depth analysis, it is hoped to stimulate awareness of embedded security both within and outside the industry, and jointly promote the development of a safer and more reliable intelligent ecosystem. Due to the special … Read more

Analysis of the Android FART Unpacking Process

Analysis of the Android FART Unpacking Process

1. Introduction On the Android platform, the Java code written by programmers is ultimately compiled into bytecode that runs on the Android virtual machine. Since Android came into the public eye, decompilation tools such as apktool and jadx have emerged one after another, becoming increasingly powerful. The bytecode compiled from Java has become vulnerable in … Read more