RME-DisCo @ UNIZAR [www.reversea.me]
3.02K subscribers
1 photo
5.35K links
Telegram channel of RME, part of the DisCo Research Group of the University of Zaragoza (Spain) focused on cybersecurity aspects. "It’s not that I have something to hide. I have nothing I want you to see"

Link to the channel: https://t.iss.one/reverseame
Download Telegram
A Method for Decrypting Data Infected with Hive
Ransomware https://arxiv.org/pdf/2202.08477.pdf
Abusing Kerberos Constrained Delegation without Protocol Transition https://snovvcrash.rocks/2022/03/06/abusing-kcd-without-protocol-transition.html
epagneul v0.4.1 releases: visualize and investigate windows event logs https://securityonline.info/epagneul-visualize-and-investigate-windows-event-logs/
Do you want to know what things can be recovered from memory in Telegram Desktop? Take a look at our latest post, a contribution from Pedro Fernández-Álvarez, member of our research team https://reversea.me/index.php/recovering-data-from-the-memory-of-telegram-desktop-and-other-im-applications/
It is a brief summary of our work that will be presented tomorrow at DFRWS EU 2022 tomorrow by Pedro. You can now read our full article at https://doi.org/10.1016/j.fsidi.2022.301342, enjoy the reading! :)