The COVID-19 pandemic has heightened the transition of many businesses to remote work arrangements. While these changes have come to stay, it brings to fore […]
A Walkthrough of DARPA SSTIH Program-Mitigating Hardware Issues from Source.
DARPA and Galois Inc. DARPA is an agency of the U.S. Department of Defense with a mission to make pivotal investments in breakthrough technologies for […]
Reverse Engineering Malware Encryption
This is an analysis of the file malware201 in the RE101 reverse engineering challenge and the custom encryption algorithm it uses to hide strings. Though […]
Web Application Firewall – Mitigating Risk Pose to Web Apps
Many businesses today depend on web applications to complement their services. But only a few consider the risk pose by this and even only fewer […]
Key Elements of Nigeria Data Protection Regulation (NDPR).
Data breaches have been on the rise in recent times. Countries in Europe, the US and other parts of the world have put in place […]
Mitigating Windows Print Spooler “PrintNightmare” Vulnerability.
Microsoft has acknowledged the new vulnerability that affects the Windows Print Spooler service, giving attackers leverage to execute remote code with system-level privileges on all […]