My Writing
- Social Networking What Anomalies Trigger The LinkedIn Sign-In Verification Challenge? LinkedIn presents security challenges when detecting logins from unfamiliar locations, new countries, extended absences, or suspicious activity patterns. The verification process involves email links...
- Malware Attributing Cyberattack Activities to a Group in India Researchers attributed coordinated cyberattacks against South Asian organizations to a group operating from India based on target profiles, decoy document contents, embedded debug strings,...
- Malware Analysis Several Posts on Malware Analysis Tools
- Malware Anticipating Cyber Threats Beyond APT Organizations that experienced APT attacks years ago may offer insights into threats that will eventually reach other companies. Predicted trends include greater use of purchased exploits,...
- Malware Analysis Speeding up the Clock for Malware Analysis With Accelerify Some malware delays "interesting" actions for hours or days to evade automated analysis tools. Cylance's free Accelerify utility addresses this by accelerating the lab system's clock, allowing...
- Training Free Recorded Malware Forensics and Analysis Webcasts