Pedro Tavares

Pedro Tavares is a professional in the field of information security working as an Ethical Hacker, Malware Analyst and a Security Evangelist. He is also Editor-in-Chief of the security computer blog

In recent years, he has invested in the field of information security, exploring and analyzing a wide range of topics, such as malware, reverse engineering, pentesting (Kali Linux), hacking/red teaming, mobile, cryptography, IoT, and security in computer networks. He is also a Freelance Writer.

Pedro Tavares

How AsyncRAT is escaping security defenses

Learn more about the popular and dangerous AsyncRAT malware.

Chrome extensions used to steal users' secrets

Learn how Chrome extensions are being used for nefarious purposes.

Luna ransomware encrypts Windows, Linux and ESXi systems

Criminals use the Rust and Goland programming languages to develop new threats.

Digium Phones Under Attack and how web shells can be really dangerous

Learn about the dangers web shells have on Digium phones.

Bahamut Android malware and its new features

Learn all about the Bahamut malware that is once again infecting devices.

Red Teaming: Taking advantage of Certify to attack AD networks

Learn more about using Certify to attack AD networks.

LockBit 3.0 ransomware analysis

Hospitals and health systems are susceptible to the LockBit ransomware.

AstraLocker releases the ransomware decryptors

Astralocker is a piece of ransomware first identified in 2021. It is probably a fork from the well-known Babuk and other ransomware like Rook. Version 2.0 of

Analysis of Nokoyawa ransomware

Ransomware is an ongoing threat. New variants are constantly detected, and existing threats keep adding new features and techniques for performing malicious

vSingle is abusing GitHub to communicate with the C2 server

Lazarus' advanced persistent threat (APT) operations use malware specially crafted for attacking financial institutions, espionage, and disruptive purposes.

Goodwill ransomware group is propagating unusual demands to get the decryption key

Goodwill ransomware uses three different socially-driven and philanthropic activities to be able to download the decryption key.

Dangerous IoT EnemyBot botnet is now attacking other targets

EnemyBot is a dangerous IoT botnet that was designed to attack web servers, Android devices and CMS servers. Learn more in this article.