5 min read
Reverse Engineering Malware: Cactus Ransomware, Basic Static Analysis
Ransomware is always evolving, and Cactus is no exception. When I came across this sample, I knew it was worth a closer look. It’s built...
443 views
3 min read
Ransomware: Build Your Own Ransomware, Part 1
Welcome back, my aspiring cyberwarriors! Ransomware is rapidly becoming the most important form of malware afflicting our digital...
64,287 views
4 min read
SCADA Hacking: Snake, a New Variant of Ransomware Targets SCADA/ICS
Welcome back, my aspiring SCADA Hackers! The recent ransomware attack against the Colonial Pipeline in the US reminds us that SCADA/ICS...
6,088 views
3 min read
Open Source Intelligence (OSINT): OSINT Tools for Bitcoin Investigations
Welcome back, my aspiring OSINT investigators! One of the most lucrative areas for OSINT investigators is the Bitcoin and cryptocurrency...
12,958 views
6 min read
The Brief History of Russian Cyberattacks Against Ukraine and the Risks they Pose to the West
Welcome back, my cyber warriors! As the war in Ukraine rages on, it's important to keep in mind that this war didn't begin in February of...
4,581 views
4 min read
SCADA Hacking: The Key Differences between Security of SCADA and Traditional IT systems
For those who are coming from a traditional IT or IT security background, SCADA/ICS systems security can prove prove daunting. Many of...
19,124 views
5 min read
Mr. Robot Hacks: How f/society Ransomed Evil Corp for $5.9 million
Welcome back, my greenhorn cyberwarriors! For those of you who are new to Mr. Robot, Elliot Alderson is an asocial IT security engineer...
9,513 views
6 min read
Ransomware, Part 1: History and Evolution of Ransomware and Ransomware Attacks
Welcome back, my aspiring cyberwarriors! Recent events have once again emphasized the importance of SCADA security! On May 7, 2021,...
1,406 views
4 min read
Reverse Engineering Malware, Ghidra Part 3: Analyzing the WannaCry Ransomware
Welcome back, my aspiring cyber warriors! Reverse engineering is one of the most highly sought and most valuable cybersecurity/infosec...
7,536 views
5 min read
Reverse Engineering Malware, Part 1: Getting Started
In my introductory article in this new series, I attempted to lay out the merits of why you should study Reverse Engineering Malware....
31,090 views
1 min read
Dreaming of Becoming a Cyber Warrior? You can join our team NOW by becoming a Hackers-Arise MEMBER!
You can become a Hackers-Arise MEMBER and receive the following; 1. "Linux Basics for Hackers v2" Video Companion ($99 value). 2. "CWA...
5,506 views
5 min read
Anatomy of Ransomware, Part 1: Chimera
Ransomware is a type of malware that has become almost epidemic in recent years. Consumers and businesses are being hit with this malware...
14,008 views