Checkmate
  • Home
  • NII Home
  • About Us
  • Services
  • Products
    • FireSec
    • BlueScope
  • Research
  • Get Blog Updates

malware

Cybersecurity Threats at the Olympics

August 6, 2021 Shalaka Patil 0

With more than 11,000 athletes from 206 countries participating, the world is watching the delayed Tokyo 2020 Olympic Games with great enthusiasm. But, unfortunately, while the Olympics showcases the very [more]

Technical Analysis of DearCry Ransomware

April 1, 2021 Mubbashir Shaikh 0

Note: This is a technical deep-dive into DearCry ransomware. If you want a preliminary analysis of the ransomware, you can find it here. The Network Intelligence team initiated a Static [more]

DearCry Makes Organisations Cry

April 1, 2021 Mubbashir Shaikh 0

Note: We have also done a technical analysis on DearCry. Read here. It’s a warm summer morning. While sipping your morning coffee, you access the work email. But you’re unable [more]

Reverse Engineering x64 Basics – Linux on ARM64

April 30, 2018 Arannya Mukherjee 0

As you might already be aware that ARM powers a variety of low-powered devices around us, including but not limited to, phones, routers, IoT devices, etc. Therefore, it is only [more]

Malware development – Welcome to the Dark Side: Part 4

March 25, 2018 Chetan Nayak 2

Welcome to the part 4 of malware development .In the previous parts 1, 2-1, 2-2 and 3, we created a binary which can listen to the commands from our botnet [more]

Malware development – Welcome to the Dark Side: Part 3

March 10, 2018 Chetan Nayak 3

In the previous parts 1, 2-1 and 2-2 of this series we created a binary that can connect to, and parse commands sent via netcat listener. However, netcat is not [more]

Malware development – Welcome to the Dark Side: Part 2-2

March 6, 2018 Chetan Nayak 5

  In the previous parts of this blog series, I introduced the concept of writing a full-undetectable malware and about writing a client-side socket using Windows API. In this blog, [more]

Posts navigation

1 2 »

Follow Us

  • Twitter
  • LinkedIn
  • Instagram
  • Facebook

Search

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 124 other subscribers

Top Posts

  • Malware Development – Welcome to the Dark Side: Part 1
    Malware Development – Welcome to the Dark Side: Part 1
  • A Detailed Guide on OSCP Preparation - From Newbie to OSCP
    A Detailed Guide on OSCP Preparation - From Newbie to OSCP
  • Malware Development – Welcome to the Dark Side: Part 2-1
    Malware Development – Welcome to the Dark Side: Part 2-1
  • IT Act 2000 – Penalties, Offences With Case Studies
    IT Act 2000 – Penalties, Offences With Case Studies
  • SSL Pinning: Introduction & Bypass for Android
    SSL Pinning: Introduction & Bypass for Android
  • From SQL Injection To 0wnage Using SQLMap
    From SQL Injection To 0wnage Using SQLMap
  • Malware development – Welcome to the Dark Side: Part 4
    Malware development – Welcome to the Dark Side: Part 4
  • Malware development – Welcome to the Dark Side: Part 2-2
    Malware development – Welcome to the Dark Side: Part 2-2
  • Manipulating Host Headers - Not Anymore !
    Manipulating Host Headers - Not Anymore !
  • Bypassing Detection for a Reverse Meterpreter Shell
    Bypassing Detection for a Reverse Meterpreter Shell
  • National Information Assurance (NIA) Policy V2.0 –Qatar
  • 5 Cybersecurity lessons to learn from Stranger Things 
  • Consumer Protection Regulation
  • The Supply Chain Cybersecurity Saga: Challenges and Solutions
  • Attackers are actively exploiting a critical zero-day vulnerability in Adobe Commerce and Magento Open Source products
  • Breaking up on Valentine’s Day!
  • Threat actor groups are targeting VMware Horizon servers running versions affected by Log4Shell vulnerabilities
  • Threat actors are targeting critical organizations using destructive malware – “WhisperGate”
  • Holiday wishes from the CEO’s Desk!
  • Kickstart your holiday spirit with some cybersecurity binge watching!
Assessment C++ coding Cyber Security cybersecurity Elasticsearch ELK forensics FUD fully undetectable hacking holidays Kibana malware Malware Analysis malware development PCI DSS Penetration Testing pentesting Ransomware red team security trojan virus Vulnerability Assessments
  • Pankaj Lad: It would have been better if there were a small liner kind of definations used for these termologies.
  • gmd: Can you please update the blog? as the images are not accessible. Thankyou.
  • Anuraag B: You can check our online courses here.

Copyright © 2022 | WordPress Theme by MH Themes