Ransomware: Build Your Own Ransomware, Part 1
top of page


Welcome back, my aspiring cyberwarriors! Ransomware is rapidly becoming the most important form of malware afflicting our digital...


- 3 min
Open Source Intelligence (OSINT): OSINT Tools for Bitcoin Investigations
Welcome back, my aspiring OSINT investigators! One of the most lucrative areas for OSINT investigators is the Bitcoin and cryptocurrency...
10,698 views


- 6 min
The Brief History of Russian Cyberattacks Against Ukraine and the Risks they Pose to the West
Welcome back, my cyber warriors! As the war in Ukraine rages on, it's important to keep in mind that this war didn't begin in February of...
4,425 views


- 4 min
SCADA Hacking: The Key Differences between Security of SCADA and Traditional IT systems
For those who are coming from a traditional IT or IT security background, SCADA/ICS systems security can prove prove daunting. Many of...
16,630 views

- 5 min
Mr. Robot Hacks: How f/society Ransomed Evil Corp for $5.9 million
Welcome back, my greenhorn cyberwarriors! For those of you who are new to Mr. Robot, Elliot Alderson is an asocial IT security engineer...
8,295 views

- 6 min
Ransomware, Part 1: History and Evolution of Ransomware and Ransomware Attacks
Welcome back, my aspiring cyberwarriors! Recent events have once again emphasized the importance of SCADA security! On May 7, 2021,...
1,262 views

- 4 min
Reverse Engineering Malware, Ghidra Part 3: Analyzing the WannaCry Ransomware
Welcome back, my aspiring cyber warriors! Reverse engineering is one of the most highly sought and most valuable cybersecurity/infosec...
6,015 views

- 5 min
Reverse Engineering Malware, Part 1: Getting Started
In my introductory article in this new series, I attempted to lay out the merits of why you should study Reverse Engineering Malware....
28,947 views


- 4 min
SCADA Hacking: Snake, a New Variant of Ransomware Targets SCADA/ICS
Welcome back, my aspiring SCADA Hackers! The recent ransomware attack against the Colonial Pipeline in the US reminds us that SCADA/ICS...
4,079 views


- 1 min
Dreaming of Becoming a Cyber Warrior? You can join our team NOW by becoming a Hackers-Arise MEMBER!
You can become a Hackers-Arise MEMBER and receive the following; 1. "Linux Basics for Hackers v2" Video Companion ($99 value). 2. "CWA...
5,423 views


- 5 min
Anatomy of Ransomware, Part 1: Chimera
Ransomware is a type of malware that has become almost epidemic in recent years. Consumers and businesses are being hit with this malware...
12,240 views
bottom of page