Littl3fieldinLittl3fieldReverse engineering musings: WhisperGate Stages 1 & 2This is a casual blog which is mainly just an accumulation of my reverse engineering notes over the last weeks on WhisperGate Stages 1 & 2.Jan 26, 2022Jan 26, 2022
Littl3fieldinA thinking mindCapitalist conditioning: becoming aware of our participation in capitalismCapitalism needs us to participate. How can we become mindful of the conditioning it creates in us to help save the planet?Jan 1, 20221Jan 1, 20221
Littl3fieldinLittl3fieldPrivacy, security and data leak concerns hidden in Android devices: Baidu’s Network Location…Baidu’s Network Location Provider comes pre-installed in a multitude of devices across the globe and unnecessarily collects personally…Nov 9, 2021Nov 9, 2021
Littl3fieldinA thinking mindAbsorption of the mind: a world of illusionExploring the illusory nature of unwholesome mind absorption and the true nature of wholesome mind absorption from Samadhi practice.Aug 26, 2021Aug 26, 2021
Littl3fieldinA thinking mindThe theory of relativity, quantum mechanics and Early Buddhism’s Anattā (Non-self)Form is not-self. Were form self, then this form would not lead to affliction, and one could have it of form: ‘Let my form be thus, let my…Jun 23, 20211Jun 23, 20211
Littl3fieldinLittl3fieldIntelligence Preparation for the Cyber Environment (IPCE): Enhancing your Security OperationsBefore we get into this article, I just want to first provide the references used to create this. This greatly inspired by two main…Jan 23, 2020Jan 23, 2020
Littl3fieldinLittl3fieldNetwork Science & Threat Intelligence with Python: Network Analysis of Threat Actors/Malware…You might be asking… what is Network Science and how does it apply to threat intelligence?! Well, of course, am going to answer this…Jun 9, 20191Jun 9, 20191
Littl3fieldinLittl3fieldThree’s a crowd: New Trickbot, Emotet & Ryuk RansomwareThis blog post details the technical findings of an incident response case involving Trickbot, Emotet & Ryuk Ransomware. I hope, that…May 31, 2019May 31, 2019
Littl3fieldinLittl3fieldCyber Threat Intelligence: Applying Machine Learning, Data Mining and Text Feature Extraction to…IMPORTANT: This publication is officially published and owned by the University of Portsmouth. Any use of this publication must be properly…Feb 19, 2018Feb 19, 2018
Littl3fieldinLittl3fieldAnti-Forensics and Cryptography: An insight into how offenders disrupt cyber crime investigationsNote: The intention is to provide insight into how offenders may disrupt a forensic investigation; from the perspective of providing…Aug 9, 20171Aug 9, 20171