Location via proxy:
[Report a bug]
[Manage cookies]
No cookies
No scripts
No ads
No referrer
Show this form
Search for Blog
Menu
Home
Speaking
Sponsors
About Me
Contact
Home
Speaking
Sponsors
About Me
Contact
Featured Posts
Mar 28, 2025
Opinions
Hacking
The US Needs A New Cybersecurity Strategy: More Offensive Cyber Operations Isn't It
For a long time Chinese hackers have been operating in the grey area between espionage and warfare. The US has been struggling to defend its networks, but increasing offensive cyber operations in unlikely to help.
Aug 27, 2024
Vulnerability Research
Windows Internals
CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6
Performing a root cause analysis & building proof-of-concept for CVE-2024-38063, a CVSS 9.8 Vulnerability In the Windows Kernel IPv6 Parser
Feb 13, 2024
Programming
Windows Internals
Malware
Bypassing EDRs With EDR-Preloading
Evading user mode EDR hooks by hijacking the AppVerifier layer
Dec 27, 2023
Programming
Windows Internals
Malware
Silly EDR Bypasses and Where To Find Them
Abusing exception handlers to hook and bypass user mode EDR hooks.
Dec 25, 2023
Programming
Windows Internals
Malware
An Introduction to Bypassing User Mode EDR Hooks
Understanding the basics of user mode EDR hooking, common bypass techniques, and their limitations.
Sep 20, 2023
Opinions
It might Be Time to Rethink Phishing Awareness
Phishing awareness can be a powerful security tool, or a complete disaster. It all hinges on how you implement it.
Feb 21, 2023
Malware
Hacking
Opinions
A Realistic Look at Implications of ChatGPT for Cybercrime
Analyzing ChatGPT's capabilities and various claims about how it will revolutionize cybercrime.
Dec 31, 2020
Vulnerability Research
How I Found My First Ever ZeroDay (In RDP)
Mar 19, 2018
Malware Analysis
Opinions
Best Languages to Learn for Malware Analysis
May 13, 2017
WannaCry
Stories
News
How to Accidentally Stop a Global Cyber Attacks
Apr 13, 2015
Hacking
Analysis
Hard Disk Firmware Hacking (Part 1)
Latest Posts
Mar 28, 2025
Opinions
Hacking
The US Needs A New Cybersecurity Strategy: More Offensive Cyber Operations Isn't It
For a long time Chinese hackers have been operating in the grey area between espionage and warfare. The US has been struggling to defend its networks, but increasing offensive cyber operations in unlikely to help.
Aug 27, 2024
Vulnerability Research
Windows Internals
CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6
Performing a root cause analysis & building proof-of-concept for CVE-2024-38063, a CVSS 9.8 Vulnerability In the Windows Kernel IPv6 Parser
Feb 13, 2024
Programming
Windows Internals
Malware
Bypassing EDRs With EDR-Preloading
Evading user mode EDR hooks by hijacking the AppVerifier layer
Dec 27, 2023
Programming
Windows Internals
Malware
Silly EDR Bypasses and Where To Find Them
Abusing exception handlers to hook and bypass user mode EDR hooks.
Dec 25, 2023
Programming
Windows Internals
Malware
An Introduction to Bypassing User Mode EDR Hooks
Understanding the basics of user mode EDR hooking, common bypass techniques, and their limitations.
Sep 20, 2023
Opinions
It might Be Time to Rethink Phishing Awareness
Phishing awareness can be a powerful security tool, or a complete disaster. It all hinges on how you implement it.
Feb 21, 2023
Malware
Hacking
Opinions
A Realistic Look at Implications of ChatGPT for Cybercrime
Analyzing ChatGPT's capabilities and various claims about how it will revolutionize cybercrime.
Dec 15, 2022
Opinions
TikTok is a National Security Risk, Not A Privacy One
An analysis of the threat posed by TikTok and why we need to weigh our options carefully.
Nov 1, 2022
News
Everything you need to know about the OpenSSL 3.0.7 Patch (CVE-2022-3602 & CVE-2022-3786)
Prev
Page 1 of 13
Next