Recent Posts

How To Use Non Root Docker Containers

1 minute read

I am assuming you are already familiar with Docker. What most of the people do when using official Docker images is pull the image, install some stuff and l...

Lets Analyze Wasted Locker

5 minute read

This blog post will explain the workings of the ransomware named Wasted Locker based on 3 different samples. Last weeks I read a lot of articles about compan...

Lets Analyze Ragnar Locker

2 minute read

After reading this article about the Ragnar Locker ransomware running in a Windows XP VM to prevent it from being detected. I thought why not just analyze it...