Bogdan VennykFlare-on 8 task 9 write-upIt has been couple days since annual Eighth Flare-On challenge has ended, shout out to organizers for this amazing CTF and all participants…Oct 25, 2021Oct 25, 2021
Bogdan VennykWhen Red Team became Blue TeamThe other day I read amazing presentation from Black Hills Information Security about how Blue Team can benefit from using Red Team tools…Jan 31, 2021Jan 31, 2021
Bogdan VennykBuilding (not ML driven) Ransomware prevention systemBecause Ransomware attacks are currently number one cyber threat — techniques, tools and procedures for their detection…Jul 5, 2020Jul 5, 2020
Bogdan VennykHow to avoid falling down the rabbit hole while analyzing malwareIn this article I would like to take a step back and get a bird’s eye view on the malware analysis process..Jun 14, 2020Jun 14, 2020
Bogdan VennykIntro into Reverse Engineering with cats and memesIn this article I would like to show you how reverse engineering process looks like, where to put attention and some tricks I use.Sep 1, 2019Sep 1, 2019
Bogdan VennykWild hunt or how you can automate process of malware collectionWhen you only start learning malware analysis, it is always frustrating to find malicious samples…Jan 26, 20191Jan 26, 20191