CybersafeforCybersafecybersafe.hashnode.dev·Nov 23, 2024Hello World!Hello, World! I am Radsade. I’m Cybersecurity Engineer with computer science background.DiscussCybersecuty
Esther AdwetsforEsther Adwets's blogessadwets.hashnode.dev·Nov 15, 2024Static vs. Dynamic Analysis of Artifacts: Key Differences, Scenarios, and ExamplesIn digital forensics, an artifact is any evidence or data uncovered during an investigation. Artifacts include, but are not limited to, sync and file management metadata, cached files, data from cloud services, authentication details, encryption info...Discussmalware analysis
Shruti RajeshforZySec AIblog.zysec.ai·Oct 14, 2024October 2024: New Insights into AI-Driven Malware DetectionAs the leaves turn and pumpkin spice lattes make their triumphant return, there’s another October phenomenon that’s stirring interest—AI-driven malware detection. It sounds like something from a sci-fi movie, complete with dramatic music and ominous ...DiscussBlogsWithCC
Indu JawlaforCoderscoders.hashnode.dev·Oct 14, 2024In-Depth Exploration of Cybersecurity ConceptsThe CIA Triad: Confidentiality, Integrity, Availability 1. Confidentiality Definition: Confidentiality ensures that sensitive information is accessible only to those authorized to have access. It is fundamental in preventing unauthorized disclosure o...Discuss#cybersecurity
Sandipan RoyforByteHackr's Blogblog.bytehackr.in·Sep 10, 2024Understanding the Basics of ELF Files on LinuxThe Executable and Linkable Format (ELF) is the standard file format for executables, object code, shared libraries, and core dumps on Linux and Unix-like systems. Understanding ELF files is essential for anyone involved in software development, reve...Discuss·170 readsSecure CodingSecurity
Dru BanksforBlue Cord Securitybluecordsecurity.io·Sep 1, 2024Event ID: 14 [SOC104 - Malware Detected]In this write-up, I investigate a "Malware Detected" alert from the LetsDefend SOC platform, focusing on SOC 104 Event ID: 14, involving googleupdate.exe. Using tools like VirusTotal and X-Force Threat Intelligence, along with log and process analysi...Discuss·57 readsLetsDefendSOC Analyst
Maxwell Antwi BosiakoforMaxwellcybermonday.hashnode.dev·Aug 19, 2024Malware: The Silent ThreatIntroduction According to Cybersecurity Ventures, the global cost of cybercrime, largely driven by malware, reached $8.4 trillion in 2022, and it’s expected to grow to $10.5 trillion by 2025. Malware is a serious threat to individuals and organizatio...Discuss·2 likesMalware
Dru BanksforBlue Cord Securitybluecordsecurity.io·Aug 8, 2024Malware Analysis: Compiled Python ExecutablesThis article explains the process of decompiling malicious Python executables using tools like Pyinstxractor-ng and Decompyle++. It covers the various stages of the Pyinstaller compilation process, from analysis and collection to bytecode compilation...Discuss·116 readsMalware
Nguyễn Văn TrungforFIS Securityblog.fiscybersec.com·Jul 24, 2024Sự cố CrowdStrike bị lợi dụng: Cảnh báo về phishing và phát tán mã độc1. Thông tin chi tiết. Vào thứ Sáu vừa qua ngày 19 tháng 7, công ty bảo mật CrowdStrike đã phát hành một bản cập nhật cấu hình sensor định kỳ, nhưng không may đã gây ra lỗi logic và dẫn đến lỗi màn hình xanh chết chóc (BSOD) trên các hệ thống Windows...Discuss·67 readsNewsletterscrowdstrke
Achal TiwariforLinux Learner's Logachaltiwari.hashnode.dev·Jul 22, 2024ShellCode 1.0Hey there! Today, we're diving into the fascinating and somewhat intimidating world of shellcode. If you've ever wondered how hackers manage to take control of a compromised machine, shellcode is often a big part of the answer. Let's break it down to...DiscussMalware