top of page
Search
malwrr
Aug 7, 20224 min read
Beyond Good, Evil and Cyber Security
For a start, let’s question the basic assumptions the philosophers make. “Who says there is an opposition between Truth and Falsity? Or...
33 views0 comments
malwrr
Jul 18, 20227 min read
Awesome Forensic Artifacts - Chrome
Google Chrome has become unanimous among all computer users and so, it has become a focus for the adversaries and a valuable resource for...
86 views0 comments
malwrr
Apr 25, 20214 min read
A modern take on Windows Event Log analysis
U.S. Government's Office of Personnel Management (OPM) Data Breach 2013 - 2015 is one of the largest in the government sector globally,...
116 views0 comments
malwrr
Apr 13, 20205 min read
Breach Response - A Rehash
Before we begin, I would recommend to the readers Data Breach Preparation and Response – by Kevvie Fowler on which this post is based on....
43 views0 comments
malwrr
Mar 11, 20205 min read
USAF - CyberWarfare Career path
I presented a talk last year briefing a paradigm shift that SOCs are being subject to in recent years. The talk was addressed to military...
67 views0 comments
malwrr
Feb 21, 20206 min read
FREEZE v1.27 - A decade of cracking
Looking at all the variants of commercial AAA malware titles like Trickbot or Emotet, I wonder what it was like a decade ago. Cracked...
66 views0 comments
bottom of page