Cyber Security Resources
True Positive False Positive
Learn More
False positives are an everyday occurrence for analysts. To an analyst, a false positive, while sometimes time…
Writing a Malware Config Parse…
Learn More
Radare2 has been receiving a lot of attention lately. Rather than browsing through some of the documentation, I…
BernhardPOS – New POS Malware…
Learn More
Yet another new credit card dumping utility has been discovered. BernhardPOS is named after (presumably) its…
TrueCrypt’s Egress
Learn More
Security stories have taken on new life in our post-Snowden information security world. Truth is stranger than…
LogPOS – New Point of Sale Mal…
Learn More
Introduction
There has been an explosion in POS malware in the last year. At Morphick, Nick Hoffman and I…
Webshells and MOF
Learn More
(Note: If you would prefer a less technical summary, check out Chinese and Russian Attackers Hide In Plain…
The Little Dumper That Could
Learn More
I’ve recently been doing a lot of work around credit card dumpers at Morphick. While casually browsing through…
The Mozart RAM Scraper
Learn More
As a reverse engineer on the Morphick Cyber Security team, I spend a large part of my time pulling apart and…
LusyPOS and Tor
Learn More
At our day jobs, as reverse engineers at Morphick, Jeremy and I have been hunting new POS malware.
A new sample…
Curious Korlia
Learn More
Reverse engineers organize discrete of pieces of malware into families. While digging through my malware collection I…
Network Traffic Anomaly Analys…
Learn More
Intrusion Detection Systems are a powerful tool in the fight against threats to the network. Just like any tool,…