Recent posts

Access Token Manipulation

This technique is highly dangerous because it's acts as another user without knowing the password and that's enables...

9 minute read

Visibility Heatmap

visibility heat map that shows which ATT&CK techniques your current data sources can detect and more importantly, wh...

3 minute read

Attacker Heatmap

Create a full picture of building a strong detection environment based on the attacker's behavior.

5 minute read

APT Attack Cases Using Dora RAT Against Korean Companies

(ASEC) found that the Andariel APT group recently attacked Korean companies, including those in education and manufac...

11 minute read

Mac-os malware-analysis guide

macOS malware encompasses various types of malicious software designed to target macOS systems, including adware, spy...

5 minute read

Record Breaker

The malware collects system information, communicates with remote servers, and can send and receive data. It may also...

10 minute read

Memory Forensics With Volatility Tool

Volatility is a potent tool for memory forensics, capable of extracting information from memory images (memory dumps...

28 minute read

Unpacking Malware

Unpacking malware involves analyzing and deconstructing the protective layers that malware authors use to obfuscate t...

4 minute read