Windows

Analyzing Phishing Attacks: Lumma Stealer and PowerShell Obfuscation

This blog is gonna be about analyzing and identifying a phishing scheme leading into a dropper that executes a stealer(credits to my associate that ...

From Windows 1.0 to Windows 11: The Evolution of Microsoft’s Operating System and What’s New in the Latest Release!

When it comes to computing, few things are as iconic as the Microsoft Windows operating system. Since its initial release in 1985, Windows has ...

Process Injection in Malware Development – Reverse Engineering

Process Injection is one of the foremost well-known strategies malware creators use to bypass firewalls, perform memory forensics procedures, ...

Ocsaly Academy
Logo
Shopping cart