top of page
3 min read
Cyber Threat Intelligence: Malware Bazaar on the Frontlines of Threat Intelligence
Welcome back, aspiring cyberwarriors! In the complex realm of cybersecurity, professionals face a continuously evolving landscape of...
138 views
3 min read
Ransomware: Build Your Own Ransomware, Part 1
Welcome back, my aspiring cyberwarriors! Ransomware is rapidly becoming the most important form of malware afflicting our digital...
63,659 views
3 min read
Reverse Engineering Malware: Getting Started with Ghidra, Part 1
Welcome back, my aspiring cyber warriors! There are a number of excellent tools available to use in the field of reverse engineering (see...
18,852 views
6 min read
Ransomware, Part 1: History and Evolution of Ransomware and Ransomware Attacks
Welcome back, my aspiring cyberwarriors! Recent events have once again emphasized the importance of SCADA security! On May 7, 2021,...
1,403 views
4 min read
Reverse Engineering Malware, Ghidra Part 3: Analyzing the WannaCry Ransomware
Welcome back, my aspiring cyber warriors! Reverse engineering is one of the most highly sought and most valuable cybersecurity/infosec...
7,519 views
5 min read
Reverse Engineering Malware, Part 1: Getting Started
In my introductory article in this new series, I attempted to lay out the merits of why you should study Reverse Engineering Malware....
30,999 views
bottom of page