A summary of anti-analysis technologies used by malware loaders.
Tracing the evolution of malware analysis offers us a retrospective on the strategies in cybersecurity offense and defense.
Fell victim to a trojan, so decided to conduct reverse analysis on it.
A Crypto challenge as a starting point to explore the security vulnerabilities of stream ciphers.
Classic Interviewer: Tell me how the client and server work when sending HTTPS!
SQL injection 101