Open in app

Sign in

Write

Sign in

Bogdan Vennyk
Bogdan Vennyk

79 Followers

Home

About

Bogdan Vennyk

Bogdan Vennyk

Flare-on 8 task 9 write-up

It has been couple days since annual Eighth Flare-On challenge has ended, shout out to organizers for this amazing CTF and all participants…

Oct 25, 2021
Flare-on 8 task 9 write-up
Flare-on 8 task 9 write-up
Oct 25, 2021
Bogdan Vennyk

Bogdan Vennyk

Zero2Automated —  Custom Sample analysis

May 7, 2021
Zero2Automated —  Custom Sample analysis
Zero2Automated —  Custom Sample analysis
May 7, 2021
Bogdan Vennyk

Bogdan Vennyk

When Red Team became Blue Team

The other day I read amazing presentation from Black Hills Information Security about how Blue Team can benefit from using Red Team tools…

Jan 31, 2021
When Red Team became Blue Team
When Red Team became Blue Team
Jan 31, 2021
Bogdan Vennyk

Bogdan Vennyk

Building (not ML driven) Ransomware prevention system

Because Ransomware attacks are currently number one cyber threat — techniques, tools and procedures for their detection…

Jul 5, 2020
Building (not ML driven) Ransomware prevention system
Building (not ML driven) Ransomware prevention system
Jul 5, 2020
Bogdan Vennyk

Bogdan Vennyk

How to avoid falling down the rabbit hole while analyzing malware

In this article I would like to take a step back and get a bird’s eye view on the malware analysis process..

Jun 14, 2020
How to avoid falling down the rabbit hole while analyzing malware
How to avoid falling down the rabbit hole while analyzing malware
Jun 14, 2020
Bogdan Vennyk

Bogdan Vennyk

Intro into Reverse Engineering with cats and memes

In this article I would like to show you how reverse engineering process looks like, where to put attention and some tricks I use.

Sep 1, 2019
Intro into Reverse Engineering with cats and memes
Intro into Reverse Engineering with cats and memes
Sep 1, 2019
Bogdan Vennyk

Bogdan Vennyk

Wild hunt or how you can automate process of malware collection

When you only start learning malware analysis, it is always frustrating to find malicious samples…

Jan 26, 2019
1
Wild hunt or how you can automate process of malware collection
Wild hunt or how you can automate process of malware collection
Jan 26, 2019
1
Bogdan Vennyk

Bogdan Vennyk

79 Followers

Threat hunting. Malware Analysis. Red teaming.

Following
  • The Medium Blog

    The Medium Blog

  • HackingDave

    HackingDave

  • LeOleg

    LeOleg

  • Jon Hencinski

    Jon Hencinski

  • Mykhailo Pazyniuk

    Mykhailo Pazyniuk

See all (11)

Help

Status

About

Careers

Press

Blog

Privacy

Terms

Text to speech

Teams