Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Fundamentals

  1. Home
  2. Fundamentals

Category: Fundamentals

Fundamentals

Consumer Protection RegulationFeatured

A summary of Article 6 requirements for Consumer Protection Regulation (CPR) by the Central Bank of UAE (CBUAE) With the ever-evolving digital landscape and advancements […]

April 13, 2022January 10, 2025
0
Case Studies Fundamentals

The Supply Chain Cybersecurity Saga: Challenges and SolutionsFeatured

According to a study by Argon Security, software supply chain attacks grew by more than 300% in 2021 compared to 2020. The study also indicated that attackers […]

February 28, 2022January 20, 2025
0
Fundamentals Phishing Reading

Breaking up on Valentine’s Day!Featured

Valentine’s Day is approaching fast. And on this day, if anyone is more active than lovers around the world, it is the cybercriminals.  Cybercriminals always […]

February 11, 2022
0
Case Studies Fundamentals Reading

Holiday wishes from the CEO’s Desk!

The end of 2021 brought with it two high-impact events. One was the appearance of the Omicron variant that has led to a resurgence in […]

December 25, 2021
0
Fundamentals Hacks Incident Response Malware Analysis Tools Uncategorized

Reverse Engineering For Beginners – XOR encryption – Windows x64

Prologue In the previous blogpost, we reverse engineered a binary and extracted the password from within it. This binary however contained a plaintext password. This […]

May 10, 2018January 21, 2025
0
Fundamentals Hacks Incident Response Malware Analysis Research Tools Uncategorized

Reverse Engineering x64 Basics – Linux on ARM64

As you might already be aware that ARM powers a variety of low-powered devices around us, including but not limited to, phones, routers, IoT devices, […]

April 30, 2018January 18, 2025
0
Fundamentals Hacks Incident Response Malware Analysis Research Tools Uncategorized

Reverse Engineering x64 for Beginners – Windows

Prologue In the previous blog here, we reverse engineered a simple binary containing plaintext password in Linux with the help of GNU Debugger (GDB). In […]

April 23, 2018January 18, 2025
1
Fundamentals Hacks Incident Response Malware Analysis Research Tools Uncategorized

Reverse Engineering x64 for Beginners – Linux

Prologue The main focus of this blog is to give a push start to the beginners to get in the field of reverse engineering. Since […]

April 23, 2018January 18, 2025
3
Fundamentals Hacks Research Tools Uncategorized

Malware development – Welcome to the Dark Side: Part 4

Welcome to the part 4 of malware development .In the previous parts 1, 2-1, 2-2 and 3, we created a binary which can listen to […]

March 25, 2018January 18, 2025
2
Fundamentals Hacks Research Tools Uncategorized

Malware development – Welcome to the Dark Side: Part 3

In the previous parts 1, 2-1 and 2-2 of this series we created a binary that can connect to, and parse commands sent via netcat […]

March 10, 2018January 10, 2025
3
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top