Overview Each week on Friday, we post a social media challenge known as “Detective Nevil Mystery Challenge”. On November 13th…
Today I wanted to continue the series on using LD_PRELOAD. In today’s post we are going to use LD_PRELOAD to…
Today I wanted to start what I plan to be a small series of blog posts about LD_PRELOAD. LD_PRELOAD is…
At the end of May 2019, a new family of ransomware called Maze emerged into the gaping void left by…
Find Fame, Fortune and Fun with CTFs! Video and Slide Deck from EH-Net Live! November 2019 Games are fun. They’re…
Register Now to Find Fame, Fortune and Fun with CTFs! Capture the Flag is a game that can teach valuable…
Image Credit: Paul Scherrer Institute - Ptychographic X-ray Laminography via Samuel K. Moore - writing for IEEE Spectrum Magazine -…
“Malware Data Science: Attack Detection and Attribution” (MDS) is a book every information security professional should consider reading due to…
First we must take a look at the following piece of code that will be presented in the code segment…
When we recently analyzed payloads related to Hidden Bee (dropped by the Underminer EK), we noticed something unusual. After reversing…