122 books
—
117 voters
Malware
Information Security, Penetration Testing, Social Engineering, Counter-Intelligence, Hacker/Hacking Culture and History.
“
In an age of dynamic malware obfuscation through operations such as mutating hash, a hyper-evolving threat landscape, and technologically next generation adversaries, offensive campaigns have an overwhelming advantage over defensive strategies.
”
―
―
“
A single spear-phishing email carrying a slightly altered malware can bypass multi-million dollar enterprise security solutions if an adversary deceives a cyber-hygienically apathetic employee into opening the attachment or clicking a malicious link and thereby compromising the entire network.
”
―
―
16 members,
last active 8 years ago



























