Skip to content

/DEV/URANDOM

  • Home
  • Disclaimer / Privacy Policy
  • Home
  • Disclaimer / Privacy Policy

2025

2025

Stop Calling It Digital Transformation – You Just Bought a Shiny New Firewall

Let me get this out of the way right now: Implementing a new SIEM or slapping AI on your broken...

2 August 2025
Blog / Mumbo Jumbo

Malware Analysis – Lesson 2: Advanced Techniques and Practical Examples

1. Advanced Static Analysis: Unpacking and Deobfuscation Understanding Packers Packers compress and encrypt executable files to evade detection and analysis....

11 April 2025
Blog / InfoSec

Subtle Guide to Malware Analysis

1. Introduction to Malware Analysis Malware analysis is the process of determining the functionality, origin, and potential impact of malicious...

11 March 2025
Blog / InfoSec

The Compliance Pitfall: PCI-DSS 3.2.1–4.0 and the Haunted 4.0.1

An email started it all, as all good corporate horror stories do. The subject line proclaimed, “Important Update: PCI-DSS Version...

17 January 2025
Blog / Mumbo Jumbo

An Ironic Horror Tale of CISM, CRISC, and CISA: The Certification Gauntlet

Certifications, oh dear. Those are the modern-day requirements for those who wish to establish their value in the field of...

4 January 2025
Blog / Mumbo Jumbo / Tech

/DEV/URANDOM © 2025. All Rights Reserved.