Dorka Palotay

Senior Threat Researcher

All posts by Dorka Palotay

  • Reverse Engineering Go Binaries with Ghidra, Part 2: Type Extraction, Windows PE Files and Golang Versions

    This is the second part in our series about reverse engineering Go binaries with Ghidra. In the previous article, we discussed how to recover function names…

  • 5 Cybersecurity Threat Predictions for 2022

    Over 50% of people are at least moderately concerned about cybersecurity threats and the impact they might have on their lives. And, when a person is…

  • IoT Botnet Report 2021: Malware and Vulnerabilities Targeted

    As the number of IoT devices in an average household continues to grow, so does the number and the sophistication of attacks...

  • The Sysrv Botnet and How It Evolved

    People used to say that Linux was free from malware. Well, not only was it not true for the past 25 years, but we now live…

  • DEF CON Quals CTF 2021: the CHSH Game, Entangled qubits, and Decrypting the Flag

    On the first weekend of May, our team from CUJO AI Labs participated in the DEF CON CTF 2021 QUALS. Although we didn’t qualify for DEF…

  • Reverse Engineering Go Binaries with Ghidra

    Go (also called Golang) is an open source programming language designed by Google in 2007 and made available to the public in 2012. It gained popularity…