Malware Analysis – Lesson 2: Advanced Techniques and Practical Examples 1. Advanced Static Analysis: Unpacking and Deobfuscation Understanding Packers Packers compress and encrypt executable files to evade detection and analysis.... 11 April 2025 Blog / InfoSec
Subtle Guide to Malware Analysis 1. Introduction to Malware Analysis Malware analysis is the process of determining the functionality, origin, and potential impact of malicious... 11 March 2025 Blog / InfoSec
The Compliance Pitfall: PCI-DSS 3.2.1–4.0 and the Haunted 4.0.1 An email started it all, as all good corporate horror stories do. The subject line proclaimed, “Important Update: PCI-DSS Version... 17 January 2025 Blog / Mumbo Jumbo
An Ironic Horror Tale of CISM, CRISC, and CISA: The Certification Gauntlet Certifications, oh dear. Those are the modern-day requirements for those who wish to establish their value in the field of... 4 January 2025 Blog / Mumbo Jumbo / Tech
When a CrowdStrike Update Went Rogue: A Cybersecurity Fiasco and Lessons Learned In the ever-dramatic world of cybersecurity, where threats lurk in every digital shadow, CrowdStrike managed to throw a plot twist... 30 October 2024 Blog / InfoSec / Mumbo Jumbo
The UniSuper-Cloudocalypse: The Day Google Deleted Everything and Redesigned Risk Management Pretend for a second that you are a superannuation fund, the custodian of the retirement funds of countless Australians. Everything... 17 August 2024 Blog / Mumbo Jumbo
GRC: The Most Boring Field in Cybersecurity SARCASM WARNING! What comes to your mind when you think about cybersecurity? High-stakes battles against shadowy hackers? On-the-edge episodes of... 17 June 2024 Blog / InfoSec / Mumbo Jumbo
The Risks of Blindly Embracing AI in Enterprises Artificial Intelligence (AI) has become identified with innovation and progress in the current technological landscape. Many enterprise organizations rush to... 2 June 2024 Blog / Mumbo Jumbo
Nmap for us! The Noobs: The Complete Idiot’s Guide to Scanning Networks Well hello there my felonious friends! Are you ready to unlock your inner criminal mastermind? Then gather ’round, because I’m... 2 December 2023 Blog / InfoSec
PCI-DSS, ISO, NIST, CIS: Understanding and Implementing Security Standards Are you confused about the various security standards floating around the cybersecurity industry? You’ve probably encountered acronyms like PCI-DSS, ISO,... 25 May 2022 Blog / InfoSec