Category:

Building A Custom Tool For Shellcode Analysis

Building A Custom Tool For Shellcode Analysis

The Zero2Hero malware course continues with Daniel Bunce demonstrating how to write a custom tool to load, execute and debug malicious shellcode in memory. Recently, FireEye posted a blog post detailing malware used by APT 41, specifically the DEADEYE initial first...

How GCP helps you take command of your threat detection

How GCP helps you take command of your threat detection

Why do we keep talking about security all the time? Why hasn't anyone just gone and fixed it?You've probably heard these questions, whether from your leadership, or a board member, or just from friends. Then you labor at explaining why security in the cloud is so...

Reach Me

Request a Call Back by filling out and submitting the following form.

+1 408-568-3993

    What is 8 x 1 ? Refresh icon