1. Reading List

    I happen to read a lot.. From comics, deep technical books, politics, to my favorite - thrillers and suspense novels. Instead of listing my favorite books I have come across, I decided to share some professional book lists that I reference from time to time when something new is needed… …


  2. Yara Baby!

    Yara is awesome! It’s one of the best malware analysis tools developed for identifying, finding, and quickly remediating malware specimes based on a set of characteristics. Being orgianlly developed for classifying maleare, it’s become my goto utility for threat hunting and is becoming increasingly popular. If your not familiar with this tool, please review the resources below. For those interested, I’m sharing my collection of rules for use. …


  3. CTI Resources

    One of the core function of cyber threat intelligence analyst focuses on providing actionable information on adversaries in an effort to remain one step ahead. In my previous post I shared my love for Feedly, which allows me to review large amounts of information around the web, also provided a link to my exported OPML file for you to jump start your research. …


  4. Encrypting Files OSX - CLI

    MacOS has a great built-in compression utility but unfortunantely the UI options don’t include any encryption options. In order to take advantage of this feature you will need to venture down to the CLI. …


  5. Automated Malware Analysis - Part 4

    After preparing OSX host in Part 1, Part 2, and Part 3 we are ready to install our victim guest operating system. For this I’m using a MS Windows 7 host with Adobe Reader, Flash, and MS Office. …