April 23, 2023, 6:42 a.m. | Cyber Golden Retriever

InfoSec Write-ups - Medium infosecwriteups.com

Viruses & trojans & worms, oh my!

Malware Analysis

For the newcomers to this series, I am a cybersecurity professional who set up a fake vulnerable computer (commonly called a Honeypot) in order to trick hackers into revealing their tactics. In this segment, we will be analyzing some of the viruses, trojans, and worms (oh my!) that we have captured with my Honeypot. If you have not read the first part of the series then feel free to click on …

amp called caught computer cybersecurity cybersecurity professional fake find free hackers hacking honeypot link malware order security segment series speed tactics tech technology trojans viruses vulnerable worms

Principal - Cyber Risk and Assurance - Infra/Network

@ GSK | Bengaluru Luxor North Tower

Staff Security Engineer

@ Airwallex | AU - Melbourne

Chief Information Security Officer

@ Australian Payments Plus | Sydney, New South Wales, Australia

TW Test Automation Engineer (Access Control & Intrusion Systems)

@ Bosch Group | Taipei, Taiwan

Consultant infrastructure sécurité H/F

@ Hifield | Sèvres, France

SOC Analyst

@ Wix | Tel Aviv, Israel