Hartoyo Wahyu

Hartoyo Wahyu

Detection Engineering & Threat Hunting


Poisoning the Algorithm: How SEO Scams Exploit Google Gemini AI in Indonesia

Poisoning the Algorithm: How SEO Scams Exploit Google Gemini AI in Indonesia

Introduction Search has always been a battleground between defenders and attacker...

When “I’m Not a Robot” Becomes Malware — The ClickFix Deception Unmasked

When “I’m Not a Robot” Becomes Malware — The ClickFix Deception Unmasked

In the evolving world of cybersecurity threats, ClickFix is one of the clearest ex...

Uncovering the Marijuana PHP Backdoor and How They Evading Detection

Uncovering the Marijuana PHP Backdoor and How They Evading Detection

At the start of 2025, I found myself navigating a challenging situation while assi...

Streamlining Digital Forensics Investigations with Cyber Triage

Streamlining Digital Forensics Investigations with Cyber Triage

In this blog, we delve into the practical application of Cyber Triage tools in ana...

Malware Analysis & Reverse Engineering Cheat Sheet

Malware Analysis & Reverse Engineering Cheat Sheet

Cheat sheet for building a local, isolated sandbox for malware analysis and revers...

Deep Dive Into Redline Stealer

Deep Dive Into Redline Stealer

RedLine is a stealer distributed as cracked games, applications, and services. The...

Unveiling Smokeloader with Procmon

Unveiling Smokeloader with Procmon

Decoding malware loaders using Procmon and AI (ChatGPT). Utilising Powershell to r...