Amadey Malware: A Comparative Study of Static Detection vs Memory-Based Detection
Comparing static vs memory-based malware detection using Amadey, showing why runtime YARA rules outperform file-hash approaches.
Representative Foreword
The representative foreword of this blog: security now fails less at finding issues than at absorbing, sustaining, and acting on what has already been found.
This essay frames the entire site first. The posts on technical analysis, method, and governance all start from this same problem statement.

Detection, Method, Governance
Comparing static vs memory-based malware detection using Amadey, showing why runtime YARA rules outperform file-hash approaches.
A technical analysis of how BYOI, BYOVD, DLL hijacking, and service abuse shifted endpoint attacks from EDR bypass to EDR kill between 2020 and 2025.