evasivemalware.com/EvasiveMalwa...
Thanks to @nostarchpress.bsky.social & @nostarch.bsky.social for letting me share it! 🤓
evasivemalware.com/EvasiveMalwa...
Thanks to @nostarchpress.bsky.social & @nostarch.bsky.social for letting me share it! 🤓
evasivemalware.com/EvasiveMalwa...
Thanks to @nostarchpress.bsky.social & @nostarch.bsky.social for letting me share it! 🤓
(I actually think this is a good idea and have complained about actor naming for years but both these companies are #1 in “attribution is marketing” so it is very funny to see)
(I actually think this is a good idea and have complained about actor naming for years but both these companies are #1 in “attribution is marketing” so it is very funny to see)
And thanks to everyone who attended my talk and workshop on malware evasion techniques 🤓
Until next year!
And thanks to everyone who attended my talk and workshop on malware evasion techniques 🤓
Until next year!
This is a heavy hands-on training where you will learn advanced techniques to build your own AI CTI arsenal for real-world use cases, not theory!
Check the quick overview of the modules 👇
1️⃣ - Intro & Setup
Get your […]
This is a heavy hands-on training where you will learn advanced techniques to build your own AI CTI arsenal for real-world use cases, not theory!
Check the quick overview of the modules 👇
1️⃣ - Intro & Setup
Get your […]
Last week, after reading a paragraph, I doodled in the margin "What about <x>..." and then looked into it.
22yo vulnerability now reported to MSRC.
Last week, after reading a paragraph, I doodled in the margin "What about <x>..." and then looked into it.
22yo vulnerability now reported to MSRC.