Thank you for all your hard work teaching and informing us! Deobfuscating both the malware and spooky and mysterious nature of how malicious actors operate is sure to make all of us a lot safer
This is why some antivirus software uses heuristics (via virtualization) to determine what a piece of malware does instead. Great short!
I love the clarity of how you explain things. Your explanations are super easy to understand and your format is clean to watch. Well done and thank you 😊
I've recently found your channel and I extract so much pure joy while watching videos. I adore content that you provide, your manner of telling and also your personality. Subscribed several hours ago. I think, there are in Youtube must be more content like this. Wish you all the best! < 3
I get anxiety when you speak to me like this
would be cool if you'd show it with an example too ... but still a great short
Lol these comments are 50% simping and 50% arguing that a woman cannot possibly be making these videos and therefore she must be an AI
I have always wondered this. On Linux, I don't have an Anti Virus. I am about as careful as maybe most Linux users are with downloading stuff. I check for packages first, and if those aren't up to snuff, usually I just hope there is a tar ball with a SHA-256 Key. Ironically, when I back to Windex 11, I tried to install one of my favorite programming languages and Defender thought it was a virus lmao. (It was Nim btw. And yes, I know if its 'reputation' now, I just thought it was actually funny at the time, hardly an inconvenience since I know my system better now)
POV: The girl you kidnapped starts lecturing you on random cyber security facts
Love your content, top notch !👏🏻👏🏻👏🏻
That's true for most antivirus that relies on heuristics and checking the system calls. Some sophisticated antivirus actually uploads the potential virus, runs it in VM, and see the actual behavior when it's running. Of course there's the other issue of VM checks and non determinism but it's a cat and mouse game
Cool ! I'm gonna do that in my next malware
this channel is like poppy if poppy was a very competent software engineer
In the 90s I used this method to develop a proprietary communication protocol to hide the encryption/decryption keys as they were only "visible" in memory whilst executing.
Excellent information and you are an Excellent speaker.
Behavior analysis which modern AV/ EDR solutions provides these days can mitigate this type of issues based on analysis of real time pattern/ behaviour of file
This is both interesting and terrifying.
I watch this daily to learn how to hold eye contact
you are a natural at teaching.
@GaryTheFsh