PinnedBrandy Gordon in Native AlgorithmsWhat is Malware Analysis and Reverse Engineering?A Systematic Approach to Understanding Malware2 min readยทOct 12, 2023----
Brandy Gordon in Native AlgorithmsDe-obfuscating Malicious Code๐ก๐กScenario: A suspicious configuration file was found on your companyโs system. During an analysis of the file you found thisโฆ3 min readยทJan 1, 2024----
Brandy Gordon in Native AlgorithmsHow Malware ษVโณฤษโด Your Defensive Arsenal๐กThere are many techniques used by attackers to bypass defensive security measures such as your firewalls and IDS/IPS systems. Encoding isโฆ2 min readยทJan 1, 2024----
Brandy Gordon in Native AlgorithmsCybersecurity: We Never Had TimeLet Us Talk Security2 min readยทJul 16, 2023----
Brandy Gordon in Native AlgorithmsWhat is the Difference Between Stack and Heap Buffer Overflow AttacksWhen Programming and Cybersecurity Collides2 min readยทJul 10, 2023----
Brandy Gordon in Native AlgorithmsBreaking the Attack Kill ChainOverviewโฆ3 min readยทJul 8, 2023----
Brandy Gordon in Native AlgorithmsSNMP Enumeration and CountermeasuresWhy Attackers Enumerate The SNMP?4 min readยทJul 8, 2023----
Brandy Gordon in Native AlgorithmsHow to Generate RSA and Elliptic Curve Key PairsEncryption is critical in network and public-facing cybersecurityโฆ4 min readยทMay 17, 2023----
Brandy Gordon in Native AlgorithmsPhishing, Clone Login Pages & Stolen CredentialsOperating system: Kali Linux3 min readยทMar 18, 2023----
Brandy Gordon in Native AlgorithmsHow to Install and Configure Employee Monitoring SoftwareCybersecurity Dirty Work4 min readยทFeb 25, 2023----