Welcome to ThreatBlogger. This blog will take an in-dept look at Malware and reveal how it works. Also covering the latest Threats, Cyberattacks and the ways to defend against them.

This Blog will cover the following areas:

  • Reverse Engineering
  • Malware Analysis
  • Code Analysis
  • Packers / Unpacking
  • Debugging / Patching Executables