post The Rising of Protestware During Times of WarCyber Crime cybersecurity malwareNovember 20, 2023November 20, 2023
post Malware Persistence Locations: Windows and LinuxCyber Crime cybersecurity CyberTools malwareSeptember 23, 2023September 23, 2023
post Reversing Emotet Dropping Javascriptapt Cyber Crime cybersecurity malwareMarch 22, 2023March 22, 2023
post Running Shellcode Through Windows CallbacksAttack cybersecurity researchJune 15, 2022June 15, 2022
post From a Phishing Page to a Possible Threat ActorCyber Crime cybersecurity experience malware researchApril 14, 2022April 14, 2022
post DiskKill/HermeticWiper and NotPetya (Dis)similaritiesapt cybersecurity malwareMarch 1, 2022March 1, 2022
post Paradise Ransomware: The BuilderCyber Crime cybersecurity malwareAugust 23, 2021December 24, 2021
post Babuk Ransomware: The Builderapt Cyber Crime cybersecurity malware reverse engineeringJuly 5, 2021December 24, 2021