Category

Malware Analysis

blue depth
blue depth
Reverse Engineering ARM based Mirai Botnet

Reverse Engineering ARM based Mirai Botnet

In this video, I’ll walk you through my methodology and insights gained when uncovering how this notorious piece of malware operates. I hope to not only equip you with technical knowledge but also inspire you to strive for continued excellence and mastery in the cybersecurity field.

Dive in

Back to the Future of the Cyber Landscape

In the video, I draw from my 15 years of experience to explain that recognizing repeated patterns is crucial in cybersecurity. While new forms of attacks emerge, the core vulnerabilities remain unchanged. I also demonstrate how AI is becoming a tool for attackers, enabling even those with limited knowledge to exploit systems.

Dive in

MuddyWater Initial Access Trojan

In this malware analysis video, we explore how MuddyWater, an Iranian APT group, utilizes legitimate RMM software like Atera for initial access to target systems. Below are some key points covered, along with timestamps for easy reference.

Dive in

You can learn for free

We’ll keep you up to date with the latest trends, free content and discounts

Pavel Yosifovich

Software developer, trainer, consultant, author, and speaker. Co-author of “Windows Internals” 7th edition (2017). Author of “Windows Kernel Programming, 2nd ed” (2023), “Windows 10 System Programming Part 1” (2020) and Part 2 (2021).

@zodiacon

Uriel kosayev

Uriel Kosayev

Security researcher, consultant, and the author of the Antivirus Bypass Techniques book who lives both on the offensive and defensive fronts. Passionate about malware research, and red teaming while providing real-world security solutions. 

@MalFuzzer

Amichai Yifrach

Amichai Yifrach

30+ years of hands-on experience, Inventor, systems & electronics engineer, expert program manager, coder, cyber security researcher and startups mentor. Expert in Hardware-firmware-software integrated systems development

@The_H1tchH1ker

Wait! You can learn for free

Not ready to commit to a learning pathway?

We’ll keep you up to date with the latest cybersecurity trends, free content, and discounts in our newsletter.