malwrrAug 7, 20224 min readBeyond Good, Evil and Cyber SecurityFor a start, let’s question the basic assumptions the philosophers make. “Who says there is an opposition between Truth and Falsity? Or...
malwrrJul 18, 20227 min readAwesome Forensic Artifacts - ChromeGoogle Chrome has become unanimous among all computer users and so, it has become a focus for the adversaries and a valuable resource for...
malwrrApr 25, 20214 min readA modern take on Windows Event Log analysisU.S. Government's Office of Personnel Management (OPM) Data Breach 2013 - 2015 is one of the largest in the government sector globally,...
malwrrApr 13, 20205 min readBreach Response - A RehashBefore we begin, I would recommend to the readers Data Breach Preparation and Response – by Kevvie Fowler on which this post is based on....
malwrrMar 11, 20205 min readUSAF - CyberWarfare Career path I presented a talk last year briefing a paradigm shift that SOCs are being subject to in recent years. The talk was addressed to military...
malwrrFeb 21, 20206 min readFREEZE v1.27 - A decade of crackingLooking at all the variants of commercial AAA malware titles like Trickbot or Emotet, I wonder what it was like a decade ago. Cracked...