Today, the NSA released its free "GHIDRA" software reverse engineering tool. It can be used to analyze malicious code and malware like viruses. Cybersecurity professionals can use it to better understand potential vulnerabilities in their networks and systems. NSA will be making Ghidra available...
The US National Security Agency (NSA) is scheduled to release the "GHIDRA" reverse engineering tool that allows researchers to disassemble executable files into assembly code that can be read and analysed. This will allow members of cyber defense teams around the world to peer into the inner...
The Cyber Threat Alliance claims that a software tool leaked from the NSA is fueling a massive rise in cryptocurrency mining malware. The cyber-security experts claim they detected a "459 percent increase in the past year of illicit crypto mining," and point to leaked NSA software called...
New Snowden documents reveal that the NSA has been tracking Bitcoin users since 2013. The documents show that that the NSA used methods to directly siphon internet traffic using a program code-named OAKSTAR, as well as a sham internet anonymizing service called MONKEYROCKET. ZeroHedge has a good...
The folks from Imperva have found a new cryptomining bug out in the wild that targets database servers and application servers. What's unique about this thing is it's worm-like behavior and creation using NSA exploits that were leaked into the wild. This sucker shouldn't be able to mess with...
Last year, a Windows exploit developed by the NSA was leaked called EternalBlue. That exploit was then used to initiate the WannaCry and NotPetya cyberattacks. Now it seems the same EternalBlue exploit is being used to infect computers with a new strain "WannaMine." After infection, the script...
Kaspersky Lab, the US government's least favorite computer security outfit, has published its full technical report into claims Russian intelligence used its antivirus tools to steal NSA secrets. The Register has a good article worth reading that ties everything together. We covered this a bit...
I guess the NSA is the gift that keeps on giving. It appears that the Bad Rabbit ransomware that hit over 200 major organizations this week, primarily in Russia and the Ukraine does indeed use the EternalRomance exploit that leaked out of the NSA. Disable your WMI service to prevent the...
Iain Thomson at theregister discusses a report from Kaspersky that details how hackers could have stolen powerful and highly confidential software exploits from an NSA employee's Windows PC. According to the report, the NSA employee downloaded a backdoored MS Office key gen and Office ISO. He...
Here's a cool, but also frightening story on some of the methods the NSA used to figure out the real identity of "Satoshi Nakamoto," the creator of bitcoin. The NSA used stylometry, to compare and determine his writing style with thousands of his writings to forage through on the internet. In a...
Big Brother is watching less closely, as the National Security Agency announced the stoppage of a controversial act in their warrantless wiretapping activities. Previously, an American citizen’s text and email communication mentioning foreign people of interest had been marked for collection...
As chaos gripped the hallowed halls of various Security Operations Centers around the world, Microsoft stood like a defiant digital Gandalf. "You shall not pass!" they declared as they smashed the ground with the Staff of Patching, releasing a golden ring of light and sending their adversaries...
Goodness, China, what a big Supercomputer you have! The better to brute force your encryption with, my dear! The NSA and the DOE are both warning that unless significant increases are made in U.S. investment into supercomputer resources, China is likely to take world leadership in...