Aung Myo MyintinHorangiSecuring Bitcoin Part 2After the popularity of our previous article, and incidents we see in the crypto market space, we decided to write a second article…Nov 9, 2017Nov 9, 2017
Aung Myo MyintinHorangiCCleaner malware was worse than expectedWhat is the CCleaner?Sep 27, 2017Sep 27, 2017
Aung Myo MyintinHorangiWhy detecting vulnerabilities at an early stage is important?Cyber threats are becoming an ever growing problem for many institutions, with hackers often targeting large companies that have customer…Sep 14, 2017Sep 14, 2017
Aung Myo MyintinHorangiAwareness of Android MalwareThe prevalence of malware is obvious, with even major news sources covering an “outbreak” every so often. Malware injection is a common…Aug 16, 2017Aug 16, 2017
Aung Myo MyintinHorangiWhy penetration testing is key for effective security strategy?An effective cyber security strategy is key to an organization’s ability to protect their assets, reputation, intellectual property (IP)…Jul 13, 2017Jul 13, 2017
Aung Myo MyintinHorangiExploiting ColdFusion 8 ServerAdobe ColdFusion is a commercial web application development software created by JJ Allaire in 1995. The CFML programming language is used…Jun 21, 2017Jun 21, 2017
Aung Myo MyintinHorangiBasic Memory Forensics with VolatilityMemory Forensics is the analysis of a computer’s memory. This is a fast growing area of research that is necessary for digital forensics…May 24, 2017May 24, 2017
Aung Myo MyintinHorangiHunting the Hunters: Creating Timelines with PlasoIntroductionApr 25, 2017Apr 25, 2017