Reading /r/netsec today, I happened to come across this recycled old 2017 blog post from Cisco security about detecting malware by applying machine learning to encrypted communications. Admittedly, it’s an interesting idea. At some point malware started using...
At Digital Operatives, sometimes our eyes are bigger than our stomach. We’re a small, focused security company trying to help the nation improve in cyber-security. Fundamentally though, we’re an “ideas” company. We come up with ideas, and as...
How much vulnerability analysis can we automate? How complete, and reliable, are those results? How well can we even answer those questions? Digital Operatives has been exploring questions like these for quite a while and the answer may be “much less than you...
Q: Is this a cyber security story or a finance risk story? A: Both, financial and cyber risks are more related than ever. I’ve read about the reasons for owning Bitcoin, some of these were intuitive for me long before this was ever compiled. Back in 2012 when I...
Magiic was created in 2013 to help users securely index and search their PGP-encrypted email. It has been a while since Magiic was released and updated, and its original functionality of indexing only messages stored on a remote IMAP server did not serve...
What does a cult Brezhnev-era movie have to do with how exploit code finds its bearings in a Windows process’ address space? How can cryptographically insecure hashing functions be exploited to create honeypots that thwart shellcode? We researched this as a part of...