post How to Reverse Office Droppers: Personal Notescybersecurity CyberTools experience reverse engineeringAugust 24, 2020December 8, 2020
post Is APT27 Abusing COVID-19 To Attack People ?!apt cybersecurity reverse engineeringMarch 19, 2020March 28, 2020
post SWEED Targeting Precision Engineering Companies in ItalyAttack Cyber Crime cybersecurity reverse engineeringOctober 28, 2019October 28, 2019
post Frequent VBA Macros used in Office MalwareAttack cybersecurity CyberTools experience reverse engineeringOctober 1, 2019October 1, 2019
post Step By Step Office Dropper DissectionCyber Crime reverse engineering SecurityApril 5, 2019April 5, 2019
post Attacking Machine Learning Detectors: the state of the art reviewAttack Cyber Crime reverse engineering Security UncategorizedJune 26, 2018January 9, 2019
post CERTs, CSIRTs and SOCs after 10 years from definitionsAttack Cyber Crime reverse engineering Security UncategorizedMarch 25, 2018January 9, 2019