Hey there, forensic enthusiasts!. I’m glad to share some insights about a tool I developed to assist with process forensic analysis—the Process Tree Analysis Tool.
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hey there, forensic enthusiasts!. I’m glad to share some insights about a tool I developed to assist with process forensic analysis—the Process Tree Analysis Tool.
Hey, Let’s Make Code Easier to Read! Ever looked at decompiled code and groaned at names like var_18 or var_1c? They’re about as helpful as a map with
In my previous blog post, I discussed how artificial intelligence can enhance malware analysis by improving code analysis workflows. Continuing that journey, this post focuses
Malware analysis is a critical yet intricate task in cybersecurity, often requiring analysts to reverse-engineer complex binaries to uncover malicious behavior. With the rise of
Cybersecurity is a wild, ever-changing world, and sneaky JavaScript malware keeps popping up where you least expect it like tucked inside perfectly normal files. Not
In the ever-evolving landscape of cybersecurity, malicious code continues to lurk in the shadows of seemingly innocent web pages. Recently, I encountered a suspicious JavaScript