
Malware development – Welcome to the Dark Side: Part 3
In the previous parts 1, 2-1 and 2-2 of this series we created a binary that can connect to, and […]
In the previous parts 1, 2-1 and 2-2 of this series we created a binary that can connect to, and […]
In the previous parts of this blog series, I introduced the concept of writing a full-undetectable malware and about […]
Welcome to the second part of the malware development blog series. Here’s the link to Part 1. Given the length […]
If you are in cybersecurity, especially Red Teaming, writing a full-undetectable (FUD) malware is a great skill to have. Folks […]
Before we start to configure our decoys and put it in our production environment, let’s take a look at what […]
On the 2nd of July 2013, the Indian Government formally approved and published the National Cyber Security Policy (NCSP). The policy […]
From the year 2012-2025 ICAO(International civil aviation organization) have decided to transform the present aviation environment by introducing new […]
by K K Mookhey, NII Consulting Scott Carney over at Trailing Technologies did an interesting post on the Chennai Cyber […]