My Writing
- Malware Analysis Hybrid Analysis Grows Up - Acquired by CrowdStrike Payload Security, the company behind the Hybrid Analysis automated malware sandbox, was acquired by CrowdStrike after three years of operation. The free community platform—with approximately 44,000...
- Malware Analysis Tips for Reverse-Engineering Malicious Code Reversing malicious Windows executables involves examining static properties, identifying suspicious strings and API calls, performing behavioral analysis, and using disassemblers and debuggers. Key...
- Cloud How to Deploy Your Own Algo VPN Server in the DigitalOcean Cloud Tunneling connections through a VPN in a public cloud helps conceal your origin and safeguard traffic when performing security research or connecting over untrusted networks. Algo VPN is an...
- Product Management What's It Like to Join a Startup's Executive Team? Joining a startup's executive team involves gaining situational awareness by talking with colleagues, board members, and customers to understand the company's real state. The early period also...
- Malware Disambiguate "Zero-Day" Before Considering Countermeasures The term "zero-day" can refer to vulnerabilities for which no patch exists, or to malware with no known detection pattern—two distinct threats requiring different countermeasures. Using "zero-day" as...
- Malware The History of Fileless Malware - Looking Beyond the Buzzword The term "fileless malware" originated with Code Red worm in 2001 and initially meant malware that remained solely in memory. It evolved to encompass specimens that avoid placing malicious...