Recent posts
APT Attack Cases Using Dora RAT Against Korean Companies
(ASEC) found that the Andariel APT group recently attacked Korean companies, including those in education and manufac...
Mac-os malware-analysis guide
macOS malware encompasses various types of malicious software designed to target macOS systems, including adware, spy...
Record Breaker
The malware collects system information, communicates with remote servers, and can send and receive data. It may also...
Memory Forensics With Volatility Tool
Volatility is a potent tool for memory forensics, capable of extracting information from memory images (memory dumps...
Unpacking Malware
Unpacking malware involves analyzing and deconstructing the protective layers that malware authors use to obfuscate t...
Browser Artifacts
Provide detailed insights into a user’s online activities and behaviors.
Recovering Digital Evidence
Tracing Digital Footprints: Insights into File Recovery and Data Carving
Process Injection
Process Injection - DLL Injection - Part One