Ahmed Razaahmedrazadev.hashnode.dev·Nov 16, 2024The Evolution of Programming Viruses and the Role of Antivirus SolutionsThe dynamic realm of technology has led to unprecedented advancements in software development, yet it has also given rise to malicious software, or viruses, designed to disrupt, damage, or exploit computer systems. Understanding how viruses are progr...Discussvirus
Ayanconnectedrhythms.hashnode.dev·Sep 27, 2024Is Antivirus Software Still Necessary in 2024? Exploring the Modern Cybersecurity LandscapeThe debate about the necessity of antivirus software is still pertinent in today's hyperconnected society, when technology permeates almost every part of our existence. Some contend that the need of traditional antivirus software may have decreased d...DiscussAntiVirus
Ronald Bartelshubandspoke.amastelek.com·Jul 14, 2024🦛The Dumb Idea of Agent Bloat | Unraveling the Cybersecurity Quagmire😱In the ever-evolving landscape of cybersecurity, one particular dumb idea seems to persist, casting a dark shadow over the very essence of efficient security measures: Agent bloat. This misguided approach involves loading an excessive number of secur...DiscussAgent Bloat
Solomon Achugwohsecuredtips.hashnode.dev·Mar 4, 2024Navigating the Complexities of Modern Endpoint SecurityThe digital landscape is constantly evolving, and with it the complexity of threats we face. Businesses face a constant barrage of cyberattacks with traditional antivirus software once considered a solid defense, struggling to keep pace with increasi...Discuss·10 likesUEM
Joan Estebanjanestebans.hashnode.dev·Jun 16, 2023Basic Windows AV Bypass - Part 5 - Embed and Execute the ShellcodeNow we can finally start coding our trojan. The malware we are going to use for testing is a reverse TCP shell from Metasploit. Before coding the shellcode loader, let's see if AVs can detect the reverse shell executable. To generate the reverse TCP ...Discuss·40 readsBasic Windows AV BypassMalware
James Gallagherjamesonhacking.hashnode.dev·Mar 13, 2023Low-Tech EDR Bypasses That WorkIn this blog post, I'll share two low-tech methods I've used for defeating antivirus, EDR, MDR, XDR and whatever else the kids on my lawn are calling it these days. The first is a method I've been using for years that has yielded many wins for me dur...Discuss·246 readsEDR
Swaleha Parvinswaleha.hashnode.dev·Feb 16, 2023Enhance the Security of Your Rocket.Chat Instance with the Rocket.Chat Security BundleI'm excited to share with you about the Rocket. Chat Security Bundle and its powerful set of security features and tools that can help secure your Rocket. Chat instance. Rocket. Chat is an open-source team communication platform that offers real-time...Discuss·10 likes·51 readsAntiVirus
Hasan MahmudforCyber Aeronautycs Ltd. Blogblog.cyberaeronautycs.com·Dec 26, 202210 ways to prevent cyber threats in the workplaceCyber threats can come in many forms, from malware and ransomware to phishing attacks and data breaches. These threats can have serious consequences for businesses, ranging from financial losses and damaged reputations to regulatory fines and legal l...Discuss·1 likethreatprevention
MetaversityOnecryptosecurity.hashnode.dev·Mar 2, 2022Security in Crypto, Hardware Wallets and Pseudonymity - Part 4/7Part 4 discusses Software Wallets and how they are made vulnerable by poor device security and the user’s habits. We discuss how to harden devices using antivirus, anti-malware, VPN and Ad-Block; and the inevitable need to use Hardware Wallets to pro...Discuss·1 like·67 readsSecurity in Crypto, Hardware Wallets and PseudonymityCryptocurrency