GlitchArc (@glitcharcblog) 's Twitter Profile
GlitchArc

@glitcharcblog

A Space for Digital Defence, Ethical Hacking, and Everything in Between.

ID: 1911430750441771008

linkhttps://www.glitcharc.blog/ calendar_today13-04-2025 14:46:41

22 Tweet

4 Followers

1 Following

GlitchArc (@glitcharcblog) 's Twitter Profile Photo

We've all heard that viruses and spyware can infiltrate Google's Android. But have you actually considered how that works? In this piece, Ruslan Mirza peels back the layers of your average Android application, and shows you what, where, and how malware authors write their

GlitchArc (@glitcharcblog) 's Twitter Profile Photo

Modern malware use an array of techniques to make them harder to detect, and consequently defend against. One of these is a Domain Generation Algorithm. In this article, Nipun Negi gives you the gist of this technique, and how to defend against it. A great one if you're a

GlitchArc (@glitcharcblog) 's Twitter Profile Photo

Broadcasts are a neat trick in Android that carry out actions based on events. But sometimes, these broadcasts can be abused my malware. In this article, Ruslan Mirzayev shows the various ways they can be abused, and how to protect your phone. #cybersecurity #android #google

GlitchArc (@glitcharcblog) 's Twitter Profile Photo

Intents are key to how applications interact with Android and its services. But what if they are misused for malicious purposes? In this piece, Ruslan Mirzayev shows you how something intended (no pun intended) for good, could be used for data theft and breaches. #android

GlitchArc (@glitcharcblog) 's Twitter Profile Photo

When it comes to cybersecurity, early detection means early mitigation. And sometimes one tool isn't enough. In this tutorial, 👑Nana Ai▪️Cyb3r57ar shows you how to integrate Wazuh, VirusTotal and Slack to make a comprehensive system that allows your SOC to be one step ahead of the very

GlitchArc (@glitcharcblog) 's Twitter Profile Photo

A Ransomware attack is one of the most frightening things that can happen to any person, business or even nation. But why? In this article, Dhanush N gives you the basic rundown of how one works, and even a trip back in time to one of the most devastating: WannaCry.

GlitchArc (@glitcharcblog) 's Twitter Profile Photo

Android malware remains one of the most fascinating things in cybersecurity, and Ruslan Mirzayev knows it. In this piece, he shows why it's important for malware analysts to peek into threads, as they tend to hold unwanted surprises. #android #malware #threads #cybercrime

GlitchArc (@glitcharcblog) 's Twitter Profile Photo

SVCStealer is an infostealer that targets Windows users, and collects credentials, crypto wallets, messaging data and even takes screenshots. In this analysis, mapol takes you through what makes this malware tick, and even tips on protecting yourself. #svcstealer #malware

GlitchArc (@glitcharcblog) 's Twitter Profile Photo

Commercial Spyware and surveillance has been on the rise lately. From NSOs Pegasus, to Sherlocks Candiru, the race is just getting started that legally puts cyberweapons in the hands of anyone with enough money to buy them. In this post, Vijay Kumar Gupta opens up the market of

GlitchArc (@glitcharcblog) 's Twitter Profile Photo

In the world of Android cybersecurity, static analysis gets a lot of red flags letting you know an app is malicious. But what if the app is literally clean until its opened? In this piece, Ruslan Mirzayev explains the role of the Reflection API, and how this tool has

GlitchArc (@glitcharcblog) 's Twitter Profile Photo

SikoMode is a Nim-compiled infostealer that checks for a C2 connection the moment it runs. No connection, and it quietly wipes itself from disk, leaving no trace. If it does connect, it reads a JPEG off the desktop, encrypts it with RC4 using a key pulled from a separate file,