Flare-on 8 task 9 write-upIt has been couple days since annual Eighth Flare-On challenge has ended, shout out to organizers for this amazing CTF and all participants…Oct 25, 2021Oct 25, 2021
When Red Team became Blue TeamThe other day I read amazing presentation from Black Hills Information Security about how Blue Team can benefit from using Red Team tools…Jan 31, 2021Jan 31, 2021
Building (not ML driven) Ransomware prevention systemBecause Ransomware attacks are currently number one cyber threat — techniques, tools and procedures for their detection…Jul 5, 2020Jul 5, 2020
How to avoid falling down the rabbit hole while analyzing malwareIn this article I would like to take a step back and get a bird’s eye view on the malware analysis process..Jun 14, 2020Jun 14, 2020
Intro into Reverse Engineering with cats and memesIn this article I would like to show you how reverse engineering process looks like, where to put attention and some tricks I use.Sep 1, 2019Sep 1, 2019
Wild hunt or how you can automate process of malware collectionWhen you only start learning malware analysis, it is always frustrating to find malicious samples…Jan 26, 20191Jan 26, 20191