Categories Malware Analysis OphionLocker Analysis: Proof Anyone Really Can Write Malware Phase Bot – A Fileless Rootkit (Part 2) Phase Bot – A Fileless Rootkit (Part 1) Usermode System Call hooking – Betabot Style Rovnix new “evolution” PowerLoader Injection – Something truly amazing Rise of the dual architecture usermode rootkit Reverse Engineering OphionLocker Analysis: Proof Anyone Really Can Write Malware Phase Bot – A Fileless Rootkit (Part 2) Phase Bot – A Fileless Rootkit (Part 1) Rovnix new “evolution” PowerLoader Injection – Something truly amazing Rise of the dual architecture usermode rootkit Threat Intelligence Darkode – Ode to Lizard Squad (The Rise and Fall of a Private Community) Usermode System Call hooking – Betabot Style The Centralization of Fraud Rise of the dual architecture usermode rootkit News RIG Exploit Kit – Source Code Leak FBI Cybercrime Crackdown – Blackshades Infamous Skynet Botnet Author Allegedly Arrested KINS Source Code Leaked Carberp source code now leaked Carberp source code, days away from full leak Vulnerability Research Passive UAC Elevation PowerLoader Injection – Something truly amazing Uncategorized Astute Explorer (GCHQ Challenge 5 – 10) Astute Explorer (GCHQ Challenge 1 – 5) A few Reason for Maximum Password Length Zorenium – The Bot That Never Was Selfish Mining – How to make Yourself Broke MtGox Nearly Breaks Bitcoin…Again End of The Line for Solar Bot (Win32/Napolar)? Fighting Hooks With Hooks – Sandbox Escape Win64/Vabushky – The Great Code Heist Personal Security – What Can Be Done? Opinions It might Be Time to Rethink Phishing Awareness A Realistic Look at Implications of ChatGPT for Cybercrime TikTok is a National Security Risk, Not A Privacy One An in-depth look at hacking back, active defense, and cyber letters of marque Malware – A One Night Stand Hacking A Realistic Look at Implications of ChatGPT for Cybercrime Hard Disk Firmware Hacking (Part 5) Hard Disk Firmware Hacking (Part 3) Intercepting all System Calls by Hooking KiFastSystemCall Using Kernel Rootkits to Conceal Infected MBR Zombie Processes as a HIPS Bypass Passive UAC Elevation Coding Malware for Fun and Not for Profit (Because that would be illegal) For Beginners Inline Hooking for Programmers (Part 2: Writing a Hooking Engine) Inline Hooking for Programmers (Part 1: Introduction) Distributed Denial Of Service (DDoS) for Beginners Creating a Secure Tor Environment Usermode Sandboxing Analysis Hard Disk Firmware Hacking (Part 3) Intercepting all System Calls by Hooking KiFastSystemCall Windows Internals Intercepting all System Calls by Hooking KiFastSystemCall Malware A Realistic Look at Implications of ChatGPT for Cybercrime