- A technical analysis of the BackMyData ransomware used to attack hospitals in Romania https://cybergeeks.tech/a-technical-analysis-of-the-backmydata-ransomware-used-to-attack-hospitals-in-romania/ 3 comments netsec
- A technical analysis of the SALTWATER backdoor used in Barracuda 0-day vulnerability (CVE-2023-2868) exploitation https://cybergeeks.tech/a-technical-analysis-of-the-saltwater-backdoor-used-in-barracuda-0-day-vulnerability-cve-2023-2868-exploitation/ 3 comments reverseengineering
- A technical analysis of Pegasus for Android – Part 2 https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-2/ 3 comments netsec
- A technical analysis of Pegasus for Android – Part 1 https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-1/ 4 comments android
- A technical analysis of Pegasus for Android – Part 1 https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-1/ 2 comments netsec
- How to analyze Linux malware – A case study of Symbiote https://cybergeeks.tech/how-to-analyze-linux-malware-a-case-study-of-symbiote/ 8 comments netsec
- How to expose a potential cybercriminal due to misconfigurations https://cybergeeks.tech/how-to-expose-a-potential-cybercriminal-due-to-misconfigurations/ 4 comments netsec
- Reverse Engineering an old Mario & Luigi game for fun https://cybergeeks.tech/reverse-engineering-an-old-mario-luigi-game-for-fun/ 2 comments reverseengineering
- Reverse Engineering an old Mario & Luigi game for fun https://cybergeeks.tech/reverse-engineering-an-old-mario-luigi-game-for-fun/ 2 comments netsec
- A detailed analysis of the new malware used by the Russian APT28/Sofacy called SkinnyBoy https://cybergeeks.tech/skinnyboy-apt28/ 6 comments reverseengineering
- A detailed analysis of North Korea's Lazarus APT malware disguised as Notepad++ Shell Extension https://cybergeeks.tech/a-detailed-analysis-of-lazarus-malware-disguised-as-notepad-shell-extension/ 9 comments reverseengineering
- And it's written in Delphi https://cybergeeks.tech/a-detailed-analysis-of-elmer-backdoor-used-by-apt16/ 8 comments delphi
- Reverse Engineering PsExec for fun and knowledge https://cybergeeks.tech/reverse-engineering-psexec-for-fun-and-knowledge/ 2 comments reverseengineering
- Reverse Engineering PsExec for fun and knowledge https://cybergeeks.tech/reverse-engineering-psexec-for-fun-and-knowledge/ 6 comments netsec
- A step-by-step analysis of the Russian Turla backdoor called TinyTurla https://cybergeeks.tech/a-step-by-step-analysis-of-the-russian-apt-turla-backdoor-called-tinyturla/ 5 comments netsec
- A step-by-step analysis of the Russian APT Turla backdoor called TinyTurla https://cybergeeks.tech/a-step-by-step-analysis-of-the-russian-apt-turla-backdoor-called-tinyturla/ 6 comments reverseengineering
- How to analyze malicious documents – Case study of an attack targeting Ukrainian Organizations https://cybergeeks.tech/how-to-analyze-malicious-documents-case-study-of-an-attack-targeting-ukraine-organizations/ 2 comments netsec
- A detailed analysis of Lazarus malware disguised as Notepad++ Shell Extension https://cybergeeks.tech/a-detailed-analysis-of-lazarus-malware-disguised-as-notepad-shell-extension/ 10 comments netsec
- Just another analysis of the njRAT malware – A step-by-step approach https://cybergeeks.tech/just-another-analysis-of-the-njrat-malware-a-step-by-step-approach/ 4 comments reverseengineering
- Just another analysis of the njRAT malware – A step-by-step approach https://cybergeeks.tech/just-another-analysis-of-the-njrat-malware-a-step-by-step-approach/ 7 comments netsec
- Revealing LAMBERTS/LONGHORN Malware Capabilities using a step-by-step approach https://cybergeeks.tech/revealing-the-lamberts-malware-using-a-step-by-step-approach-cyberespionage-group-linked-to-vault-7/ 6 comments netsec
- A detailed analysis of the STOP/Djvu Ransomware https://cybergeeks.tech/a-detailed-analysis-of-the-stop-djvu-ransomware/ 6 comments reverseengineering
- A detailed analysis of the STOP/Djvu Ransomware https://cybergeeks.tech/a-detailed-analysis-of-the-stop-djvu-ransomware/ 3 comments netsec
- A step-by-step analysis of the new malware used by APT28/Sofacy called SkinnyBoy https://cybergeeks.tech/skinnyboy-apt28/ 6 comments netsec
- HOW TO DEFEAT THE RUSSIAN DUKES: A STEP-BY-STEP ANALYSIS OF MINIDUKE USED BY APT29/COZY BEAR https://cybergeeks.tech/how-to-defeat-the-russian-dukes-a-step-by-step-analysis-of-miniduke-used-by-apt29-cozy-bear/ 3 comments reverseengineering
- HOW TO DEFEAT THE RUSSIAN DUKES: A STEP-BY-STEP ANALYSIS OF MINIDUKE USED BY APT29/COZY BEAR https://cybergeeks.tech/how-to-defeat-the-russian-dukes-a-step-by-step-analysis-of-miniduke-used-by-apt29-cozy-bear/ 3 comments netsec