FILIPI PIRES
Security Researcher and Security Advocate, Speaker and Technical Trainer of the Course Malware Attack Types with Kill Chain Methodology.
HOME
ABOUT
PRESENTATIONS TALKS
PUBLISHED ARTICLES
CATEGORIES
TAGS
ARCHIVES
Home
Published Articles
Published Articles
Cancel
Published Articles
Exploitation with Shell Reverse and Infection with PowerShell using VBS File
Zusy Malware using MSI
Secure Development Using an Open Source Tool
Malware undetected by CrowdStrike
Malware Analysis – Dissecting a PDF File
Test Your Security Solution
Testing Creative Way Detection and Efficiency in Sophos Security Sensors
Outbreak Infection from Malware Bazaar, undetected by Sophos
How to Treat False Positive with Threat Hunting
Hunting the Hunters-Detection and Efficiency Testing of Endpoint Security Sensors
Malware Analysis – Dissecting a PDF File
Threat Hunting Labs Engines Problems in Cybereason AV
Infection with Ransomware Using Delay in Applying Policies
Infection by Outbreak Attack Malicious
Infection with Malware By Script Python NOT Detected by AV
Fail in Detection flow of AV-based “Malware Bazaar!”
LLMNR and NBT-NS poisoning attack
Bulk Extractor – Looking within it
Pivoting - As an Attack Weapon
Exploiting Connect Box EuroDOCSIS 3.0 - Based on CVE
Interview - eForensic Magazine
The CyberSecurity Hub - Threat Hunting
The CyberSecurity Hub - Malware Analysis
Trending Tags
PDFMalicious
MalwareAnalysis
Maldoc
Trending Tags
PDFMalicious
MalwareAnalysis
Maldoc