Hey, Let’s Make Code Easier to Read! Ever looked at decompiled code and groaned at names like var_18 or var_1c? They’re about as helpful as a map with
Author: rioasmara
Enhancing Malware Analysis with AI: Step Two – Function Renaming in HLIL Code
In my previous blog post, I discussed how artificial intelligence can enhance malware analysis by improving code analysis workflows. Continuing that journey, this post focuses
Leveraging AI Assistance in Malware Analysis: A Modern Approach
Malware analysis is a critical yet intricate task in cybersecurity, often requiring analysts to reverse-engineer complex binaries to uncover malicious behavior. With the rise of
Decoding Mechanism in JavaScript Malware: A Deep Dive
Cybersecurity is a wild, ever-changing world, and sneaky JavaScript malware keeps popping up where you least expect it like tucked inside perfectly normal files. Not
Unmasking Malicious JavaScript: A Deep Dive with AI Assistance
In the ever-evolving landscape of cybersecurity, malicious code continues to lurk in the shadows of seemingly innocent web pages. Recently, I encountered a suspicious JavaScript
Abusing SQL Server Impersonation Privileges: A Technical Walkthrough
In this blog post, we explore how attackers can abuse the IMPERSONATE privilege in Microsoft SQL Server to escalate privileges, execute system-level commands, and establish