23:41Was it Really North Korea Tools and Techniques to Attribute Malware Campaigns to Nation Statescybercdh3.9K views·4 years ago
9:26Kaseya Ransomware Attack - 5 Key Insights into this Malware campaigncybercdh6.1K views·4 years ago
18:18I bought a PHISHING website from the DARKWEB. Here's what I found...cybercdh12.6K views·5 years ago
19:51Cyber Defender REACTS to THEFT of Microsoft Exchange Server ZERO DAYS used by HAFNIUMcybercdh4.6K views·5 years ago
17:10Building a Malware Lab - Software, Hardware, Tools and Tips for Effective Malware Analysiscybercdh19.9K views·5 years ago
33:41The Truth About Phishing - Tools, Tactics and Techniques to Analyse Phishing & Protect Your Privacycybercdh9.9K views·5 years ago
14:55SUPERNOVA - Everything you need to know to Reverse Engineer an APT WebShellcybercdh4.6K views·5 years ago
31:13SUNBURST SolarWinds RECON - Malware Reverse Engineering, OSINT and Identifying Victimscybercdh9.7K views·5 years ago
29:30SUNBURST SolarWinds Malware - Tools, Tactics and Methods to get you started with Reverse Engineeringcybercdh33.2K views·5 years ago
17:55Crack The BAT - Identifying Compression, Packers & Googling for IOCscybercdh3.3K views·5 years ago
14:10Bashing LOLSnif - Defeating Anti-Analysis Techniques to get real IOCscybercdh2.4K views·5 years ago