Search

The Medusa Ransomware Threat: Anatomy of a Cybercrime Operation
Welcome back, aspiring cyberwarriors! In Greek mythology, Medusa was once a beautiful woman until Athena’s curse transformed her into a...
8 min read
637 views


Reverse Engineering Malware: Cactus Ransomware, Basic Static Analysis
Ransomware is always evolving, and Cactus is no exception. When I came across this sample, I knew it was worth a closer look. It’s built...
5 min read
798 views


Ransomware: Build Your Own Ransomware, Part 1
Welcome back, my aspiring cyberwarriors! Ransomware is rapidly becoming the most important form of malware afflicting our digital...
3 min read
65,559 views


SCADA Hacking: Snake, a New Variant of Ransomware Targets SCADA/ICS
Welcome back, my aspiring SCADA Hackers! The recent ransomware attack against the Colonial Pipeline in the US reminds us that SCADA/ICS...
4 min read
6,175 views


Open Source Intelligence (OSINT): OSINT Tools for Bitcoin Investigations
Welcome back, my aspiring OSINT investigators! One of the most lucrative areas for OSINT investigators is the Bitcoin and cryptocurrency...
3 min read
13,144 views


The Brief History of Russian Cyberattacks Against Ukraine and the Risks they Pose to the West
Welcome back, my cyber warriors! As the war in Ukraine rages on, it's important to keep in mind that this war didn't begin in February of...
6 min read
4,603 views


SCADA Hacking: The Key Differences between Security of SCADA and Traditional IT systems
For those who are coming from a traditional IT or IT security background, SCADA/ICS systems security can prove prove daunting. Many of...
4 min read
19,252 views

Mr. Robot Hacks: How f/society Ransomed Evil Corp for $5.9 million
Welcome back, my greenhorn cyberwarriors! For those of you who are new to Mr. Robot, Elliot Alderson is an asocial IT security engineer...
5 min read
9,603 views

Ransomware, Part 1: History and Evolution of Ransomware and Ransomware Attacks
Welcome back, my aspiring cyberwarriors! Recent events have once again emphasized the importance of SCADA security! On May 7, 2021,...
6 min read
1,407 views

Reverse Engineering Malware, Ghidra Part 3: Analyzing the WannaCry Ransomware
Welcome back, my aspiring cyber warriors! Reverse engineering is one of the most highly sought and most valuable cybersecurity/infosec...
4 min read
7,670 views

Reverse Engineering Malware, Part 1: Getting Started
In my introductory article in this new series, I attempted to lay out the merits of why you should study Reverse Engineering Malware....
5 min read
31,277 views


Dreaming of Becoming a Cyber Warrior? You can join our team NOW by becoming a Hackers-Arise MEMBER!
You can become a Hackers-Arise MEMBER and receive the following; 1. "Linux Basics for Hackers v2" Video Companion ($99 value). 2. "CWA...
1 min read
5,507 views


Anatomy of Ransomware, Part 1: Chimera
Ransomware is a type of malware that has become almost epidemic in recent years. Consumers and businesses are being hit with this malware...
5 min read
14,032 views