top of page

Search

How to Identify Online Scammers Before It's Too Late: The Story of Totyo and The Treadmill
We hear about scams all the time, whether it's through phishing, vishing, smishing, or whatever malevolent ishing-for-your-money there is...
z3r0day_504
Feb 10, 20236 min read
72 views
0 comments

What is fuzzy hashing?
In a recent conversation with a coworker, the topic of fuzzy hashing came up and how frequently he uses it in his malware analysis...
z3r0day_504
Mar 14, 20221 min read
3,431 views
0 comments


AutoRun Malware: Why your computer is summoning dark lords after you plugged in that parking lot USB
For the last three weeks you've overheard your coworkers go on and on about the MMORPG they've been playing online. Curiosity starts...
z3r0day_504
Oct 22, 20214 min read
59 views
0 comments

Pesky Persistence: How "Turning It Off and On Again" May Not Solve Your Problem
Anyone that uses a computer has heard the old "have you tried turning it off and on again" as a solution to experiencing issues;...
z3r0day_504
Aug 23, 20214 min read
19 views
0 comments

Hacking the Brain: The Psychology of Phishing and Social Engineering
We hear it regularly in workplace trainings and general reporting: watch out for phishing emails and don't click on those links! Some...
z3r0day_504
Aug 10, 20214 min read
23 views
0 comments
Process Injection: Malware Lurking in the Shadows of Legitimate Programs (Part 2)
In part 1 of this series, we delved into a basic understanding of what process injection is and the different mechanisms by which it can...
z3r0day_504
Jul 28, 20214 min read
17 views
0 comments

Process Injection: Malware Lurking in the Shadows of Legitimate Programs (Part 1)
It's a Saturday afternoon, you're tinkering with your computer, and a random curiosity happens to pique your interest. You start taking a...
z3r0day_504
Jul 12, 20214 min read
23 views
0 comments

Malicious C2 Domains: How to stomp a moving target
It's rare to find single-stage malware that is powerful, tailored, and effective on a particular target. How do attackers retain control...
z3r0day_504
Jul 6, 20214 min read
163 views
0 comments

Web Shells: The Hacker's Pearl in a Sea of Networked Environments
In this blog post, we break down what a web shell is and why it poses a risk to a digital environment, review a recent event involving...
z3r0day_504
Jun 27, 20213 min read
14 views
0 comments
Windows Authentication Bypass via Accessibility Binaries
We've probably all encountered the frustrating moment of trying to login to your computer after a brief hiatus from work or school, to ...
z3r0day_504
Jun 18, 20214 min read
81 views
0 comments

RANSOMWARE: WHAT IS IT AND WHY HAS IT TAKEN CYBERSPACE BY STORM?
Unfortunately there is no rarity in daily news reporting on a new corporate victim of ransomware. The general population is most privy to...
z3r0day_504
Jun 3, 20215 min read
4 views
0 comments

BASIC SECURITY LOG ANALYSIS ON WINDOWS
Security log analysis is helpful and effective on Windows when it comes to characterizing activity involving user accounts, remote access...
z3r0day_504
May 28, 20214 min read
16 views
0 comments
Home: Subscribe

bottom of page