top of page
Search


Do you store passwords in your Notes app? That’s exactly what Perseus is hunting for.
A banking trojan is no longer just watching your apps, it is reading your notes, observing your screen, and quietly turning small habits into financial damage. What’s more interesting? Parts of it may not even be written entirely by humans. At first glance, it behaves like typical banking malware, targeting financial apps and stealing credentials. But Perseus shifts the focus from applications to user behavior . Instead of limiting itself to banking interfaces, it scans Notes
Aastha Thakker
3 min read


Reverse Engineering Doesn’t Have to Be Scary
I have written about ClamAV signatures. I have explained YARA rules. I have broken down code obfuscation techniques and even touched CPU architecture at a level that made my own brain hurt a little. And after all that, I will be honest with you, reverse engineering still occasionally makes me want to close the laptop and go make coffee and Maggie. So if you have opened this blog hoping someone would finally say it plainly: yes, it is overwhelming. Not because it is impossibly
Aastha Thakker
6 min read
bottom of page