ConsulThink ConsulThink ConsulThink
  • Home
  • Chi siamo
  • Solutions & Services ►
    • e-CyberMesh
    • e-CyberDev
    • Consulenza Specialistica
    • Consulthink Academy
    • e-CyLabs
  • News
  • ExperThinkers Room
  • Lavora con noi
  • Contatti
  • Policy
  • Privacy
News
  • Cloud
  • ExperThinkers
  • Offensive
  • Offensive Security
  • Red Team
  • Soluzioni

Azure Security Assessment

Nell’ultimo decennio l’industria del cloud computing è stata interessata da una crescita esponenziale. Secondo Exploding Topics, dal 2015 ad oggi la quantità di dati aziendali gestiti e mantenuti in cloud è raddoppiata, fino a raggiungere circa il 60% della totalità delle informazioni corporate. In particolare, circa il 22% del mercato cloud appartiene a Microsoft Azure, …

by Consulthink
Mar 19
  • Cyberattack
  • CyberSecurity
  • ExperThinkers
  • Offensive Security
  • Red Team

Rustware Part 2: Process Enumeration Development

In the previous blog post we have seen how to develop a Shellcode Process Injection in Rust; the described Process Injection flow relies on several WinAPIs: OpenProcess used to open a handle to the target process, then the VirtualAllocEx was used to allocate a new readable and writable region of memory into the target process, …

by Consulthink
Nov 6
2
  • CyberSecurity
  • ExperThinkers
  • Offensive Security
  • Red Team

Rustware Part 1: Shellcode Process Injection Development

Introduction Malware development is essential when performing activities like Red Teaming, Adversary Emulation and Network Penetration Testing, the operator can use custom malwares to perform various tasks based on the specific situation. At the same time, analyzing Malwares is useful to learn how malwares work and how to detect them, in order to defend our …

by Consulthink
Ott 27
  • CyberSecurity
  • CyberSecurity
  • ExperThinkers
  • Offensive
  • Red Team
  • Security

iOS Strings Obfuscation in Swift

Introduction Usually when reversing an iOS Application, it’s common to see methods and strings that can help an attacker to figure out how the application works. When I’m looking for jailbreak detection mechanisms, I usually start to search for strings and functions containing the word “jailbr  (jail, jailbreak or jailbroken) or “root”. If I’m not lucky with these method names, …

by Consulthink
Mag 17
4
Categorie
  • AI (2)
  • ASSINTEL (1)
  • Awareness (2)
  • Big Data (1)
  • Blockchain (1)
  • Casi di successo (1)
  • Cloud (2)
  • Cyberattack (2)
  • CyberSecurity (9)
  • Data Protection (9)
  • Enterprise Architecture (3)
  • Eventi (1)
  • ExperThinkers (26)
  • Formazione (2)
  • GDPR (11)
  • GRC (8)
  • ICT (2)
  • Information Security (8)
  • IoT (1)
  • Marketing (3)
  • Mobile (1)
  • News (8)
  • Normative (9)
  • Offensive (3)
  • Offensive Security (4)
  • People Management (1)
  • Phishing (2)
  • Premi (1)
  • Privacy (8)
  • R&D (1)
  • Red Team (4)
  • Security (5)
  • Smart Working (1)
  • Software (1)
  • Soluzioni (4)
  • Trend (4)
  • Uncategorized (1)
Ultime News
Cyber Insurance: pro e contro di un fenomeno in continua evoluzione
19 Marzo 2024
Approccio storico alla Progettazione del Software e alla Sicurezza Informatica
19 Marzo 2024
L’utilizzo dei dati nell’era dei social media: tra opportunità e rischi
19 Marzo 2024
Equilibrio tra Innovazione e Sicurezza: la Sfida della Regolamentazione AI
19 Marzo 2024
Consulthink e Lutech insieme
19 Marzo 2024
Load More

P.Iva 07855131004 - Via Cristoforo Colombo, 163 - 00147 Roma

© Consulthink. All Right Reserved 2019


Privacy PolicyCookie