top of page
Search

Beyond Good, Evil and Cyber Security
For a start, let’s question the basic assumptions the philosophers make. “Who says there is an opposition between Truth and Falsity? Or...
malwrr
Aug 7, 20224 min read
36 views
0 comments

Awesome Forensic Artifacts - Chrome
Google Chrome has become unanimous among all computer users and so, it has become a focus for the adversaries and a valuable resource for...
malwrr
Jul 18, 20227 min read
123 views
0 comments


A modern take on Windows Event Log analysis
U.S. Government's Office of Personnel Management (OPM) Data Breach 2013 - 2015 is one of the largest in the government sector globally,...
malwrr
Apr 25, 20214 min read
146 views
0 comments

Breach Response - A Rehash
Before we begin, I would recommend to the readers Data Breach Preparation and Response – by Kevvie Fowler on which this post is based on....
malwrr
Apr 13, 20205 min read
43 views
0 comments

USAF - CyberWarfare Career path
I presented a talk last year briefing a paradigm shift that SOCs are being subject to in recent years. The talk was addressed to military...
malwrr
Mar 11, 20205 min read
74 views
0 comments

FREEZE v1.27 - A decade of cracking
Looking at all the variants of commercial AAA malware titles like Trickbot or Emotet, I wonder what it was like a decade ago. Cracked...
malwrr
Feb 21, 20206 min read
70 views
0 comments
bottom of page