SAI CHARAN REDDY PTrend Micro DSM- Automation (Custom Python Scripts) Part 1Use-case 1: Computer/ Computers Intrusion Prevention Rules AssignmentJul 15, 2021Jul 15, 2021
SAI CHARAN REDDY PHow we Analyzed MageCart a.k.a Web-based Card Skimming AttackAttacks on users with Malicious JavaScripts are increasing and trending upwards which are impacting organizations through attacks like…Jul 31, 2020Jul 31, 2020
SAI CHARAN REDDY PIdentifying XML External Entities (XXE) VulnerabilitiesBefore we look at XXE, let’s look into few XML Basics which helps us to understand the main concepts behind XXE.Jul 29, 20201Jul 29, 20201
SAI CHARAN REDDY PAnalyzing Office Documents for MalwareThere are a number of ways Office documents are used to attack and compromise systems and few of the common attacks are through:Jul 28, 2020Jul 28, 2020
SAI CHARAN REDDY PStatic AnalysisContinuing from Malware Analysis- Introduction, now let us focus on the Static Analysis stage on executable files to determine what…Apr 7, 2020Apr 7, 2020