Littl3fieldReverse engineering musings: WhisperGate Stages 1 & 2This is a casual blog which is mainly just an accumulation of my reverse engineering notes over the last weeks on WhisperGate Stages 1 & 2.Jan 26, 2022Jan 26, 2022
Littl3fieldPrivacy, security and data leak concerns hidden in Android devices: Baidu’s Network Location…Baidu’s Network Location Provider comes pre-installed in a multitude of devices across the globe and unnecessarily collects personally…Nov 9, 2021Nov 9, 2021
Littl3fieldIntelligence Preparation for the Cyber Environment (IPCE): Enhancing your Security OperationsBefore we get into this article, I just want to first provide the references used to create this. This greatly inspired by two main…Jan 23, 2020Jan 23, 2020
Littl3fieldNetwork Science & Threat Intelligence with Python: Network Analysis of Threat Actors/Malware…You might be asking… what is Network Science and how does it apply to threat intelligence?! Well, of course, am going to answer this…Jun 9, 20191Jun 9, 20191
Littl3fieldThree’s a crowd: New Trickbot, Emotet & Ryuk RansomwareThis blog post details the technical findings of an incident response case involving Trickbot, Emotet & Ryuk Ransomware. I hope, that…May 31, 2019May 31, 2019
Littl3fieldCyber Threat Intelligence: Applying Machine Learning, Data Mining and Text Feature Extraction to…IMPORTANT: This publication is officially published and owned by the University of Portsmouth. Any use of this publication must be properly…Feb 19, 2018Feb 19, 2018
Littl3fieldAnti-Forensics and Cryptography: An insight into how offenders disrupt cyber crime investigationsNote: The intention is to provide insight into how offenders may disrupt a forensic investigation; from the perspective of providing…Aug 9, 20171Aug 9, 20171
Littl3fieldRecommendations and techniques for handling mobile device evidenceMobile devices have become an integral part of todays society. Ofcom (2015) report that two thirds of UK adults, 66%, own a Smartphone and…Jul 4, 2017Jul 4, 2017
Littl3fieldCyber Terrorism: understanding and preventing acts of terror within our cyber spaceContents 2. Executive Summary 2.1 Keywords 3. Introduction 3.1 Aim and methodology 4. What is cyber terrorism? 4.1 Origins and…Jun 7, 2017Jun 7, 2017
Littl3fieldAn introduction into Data Mining in Bioinformatics.Introduction Over recent years the studies in proteomic, genomics and various other biological researches has generated an increasingly…Apr 11, 2017Apr 11, 2017