
How to Detect Vulnerabilities in Software When No Source Code Is Available
In this article, we share our experience in dynamic fuzzing to identify security bugs in such popular image viewers as ACDSee, FastStone Image Viewer...
LIVE Webinar
Secure SDLC with Automation Pipelines for SaaS Products
LIVE ON
December 11, 2025
9 AM PST | 6 PM CET


In this article, we share our experience in dynamic fuzzing to identify security bugs in such popular image viewers as ACDSee, FastStone Image Viewer...

Learn how to overcome some of the most common challenges of developing a user mode file system driver.

In this article, we talk about how to create a simple display-only driver and establish its interaction with the user mode.

In this article, we explain our approach to developing Windows drivers using a QEMU virtual device.

Learn how to significantly improve and simplify your runtime algorithms with the help of Diana Dasm and Diana Processor - the solutions developed by t...

The article provides a close look at the host-based firewall architecture and explains the principles behind host-based firewalls with real-life examp...

This article covers the implementation of forensic features in SIEM solutions and the key requirements to ensure admissibility of data in court.

How we have increased mhook’s performance, enhanced its capabilities and eliminated certain bugs.

Learn how to modify HTTP traffic via using hooks or creating your own custom driver.

Several important practical tips for work with CUDA with code samples explained
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.