Skip to content

/DEV/URANDOM

  • Current Page: Home
  • Disclaimer / Privacy Policy
  • Current Page: Home
  • Disclaimer / Privacy Policy

    Malware Analysis – Lesson 2: Advanced Techniques and Practical Examples

    11 April 2025

    Subtle Guide to Malware Analysis

    11 March 2025

    The Compliance Pitfall: PCI-DSS 3.2.1–4.0 and the Haunted 4.0.1

    17 January 2025

    An Ironic Horror Tale of CISM, CRISC, and CISA: The Certification Gauntlet

    4 January 2025

    2025

    Malware Analysis – Lesson 2: Advanced Techniques and Practical Examples

    1. Advanced Static Analysis: Unpacking and Deobfuscation Understanding Packers Packers compress and encrypt executable files to evade detection and analysis....

    11 April 2025
    Blog / InfoSec

    Subtle Guide to Malware Analysis

    1. Introduction to Malware Analysis Malware analysis is the process of determining the functionality, origin, and potential impact of malicious...

    11 March 2025
    Blog / InfoSec

    The Compliance Pitfall: PCI-DSS 3.2.1–4.0 and the Haunted 4.0.1

    An email started it all, as all good corporate horror stories do. The subject line proclaimed, “Important Update: PCI-DSS Version...

    17 January 2025
    Blog / Mumbo Jumbo

    An Ironic Horror Tale of CISM, CRISC, and CISA: The Certification Gauntlet

    Certifications, oh dear. Those are the modern-day requirements for those who wish to establish their value in the field of...

    4 January 2025
    Blog / Mumbo Jumbo / Tech

    2024

    When a CrowdStrike Update Went Rogue: A Cybersecurity Fiasco and Lessons Learned

    In the ever-dramatic world of cybersecurity, where threats lurk in every digital shadow, CrowdStrike managed to throw a plot twist...

    30 October 2024
    Blog / InfoSec / Mumbo Jumbo

    The UniSuper-Cloudocalypse: The Day Google Deleted Everything and Redesigned Risk Management

    Pretend for a second that you are a superannuation fund, the custodian of the retirement funds of countless Australians. Everything...

    17 August 2024
    Blog / Mumbo Jumbo

    GRC: The Most Boring Field in Cybersecurity

    SARCASM WARNING! What comes to your mind when you think about cybersecurity? High-stakes battles against shadowy hackers? On-the-edge episodes of...

    17 June 2024
    Blog / InfoSec / Mumbo Jumbo

    The Risks of Blindly Embracing AI in Enterprises

    Artificial Intelligence (AI) has become identified with innovation and progress in the current technological landscape. Many enterprise organizations rush to...

    2 June 2024
    Blog / Mumbo Jumbo

    2023

    Nmap for us! The Noobs: The Complete Idiot’s Guide to Scanning Networks

    Well hello there my felonious friends! Are you ready to unlock your inner criminal mastermind? Then gather ’round, because I’m...

    2 December 2023
    Blog / InfoSec

    2022

    PCI-DSS, ISO, NIST, CIS: Understanding and Implementing Security Standards

    Are you confused about the various security standards floating around the cybersecurity industry? You’ve probably encountered acronyms like PCI-DSS, ISO,...

    25 May 2022
    Blog / InfoSec
    Page 1 of 212»

    /DEV/URANDOM © 2025. All Rights Reserved.