Latest Resources Library Item
Ebooks, guides, templates, and more to help you get things done.
Wednesday, 26 January 2022
Reverse engineering vs binary exploitation, or malware analysis, binary software analysis to exploitation development, vulnerability research. It is a very common and widely interrelated concept, some are put together and create the confusion and misunderstanding they refer to the same matters which it is not, just like another confusion for vulnerability assessment and penetration testing.
Monday, 03 January 2022
E-SPIN as a author, is a team that make ongoing planned theme topics publishing, industry and technology update and product content that serve various audience who visit E-SPIN official website www.e-spincorp.com At the time, the content in the E-SPIN website was divided into a few key sections for division or content: By Global Themes –
Wednesday, 15 December 2021
Zero-day vulnerability Log4j in Apache Logging Services Project, be the headline and outbreak alert at the time. Apache run as default web server, is a very typical setup, as such, it will impact a lot of web servers out there. As per the market share report, Nginx got 32.9%, followed with 31.5% by Apache. The
Friday, 03 December 2021
SECTION A: BUSINESS CONTINUITY MANAGEMENT (BCM) POLICY 1.0 Introduction “Business continuity is the capability of an organisation to continue delivering its critical activities to pre-defined levels during a disruptive incident.” (ISO22301:2014). Regardless of what business you are in, business continuity and disaster recovery (BCDR) are key activities all businesses need to carry out to make