• Skip to primary navigation
  • Skip to content
  • Skip to footer
Malware Analysis Navigating the Shadows of Cyber Threats
  • Malware Analysis
  • Threat Hunting
  • Machine Learning
  • Tools
  • All Categories
    Daniel Jeremiah

    Daniel Jeremiah

    Daniel is a Senior Security Operations Analyst with expertise in malware analysis, reverse engineering, DFIR, and adversarial machine learning (AML).

    • London Area, UK
    • Email
    • Twitter
    • LinkedIn
    • GitHub

    Recent Posts

    Threat Hunting on Windows Server 2016: Uncovering Hidden C2 Malware Using Elastic SIEM

    27 minute read

    1.0 Introduction

    Using Velociraptor to Detect and Hunt for Affected Systems: Unknown Malware Analysis

    30 minute read

    1.0 Introduction

    Inside the Zoom_Invite.call Phishing Attack: Analysing Malware Distribution Methods Via Telegram C2 Bot

    24 minute read

    Introduction

    Analysing a Fake Royal Mail Smishing Attack Hidden Behind Cloudflare

    5 minute read

    Analysing a Fake Royal Mail Smishing Attack Hidden Behind Cloudflare

    Analysing PCAP Files in a Modern Way: Investigating AsyncRAT Infection Traffic with SELKS

    27 minute read

    Introduction

    • Previous
    • 1
    • 2
    • Next
    • Feed
    © 2025 Daniel Jeremiah All rights reserved. Powered by Jekyll & Minimal Mistakes.