Skip to content

Your cart is empty

Continue shopping

Have an account?

Log in to check out faster.

Your cart

Loading...

Estimated total

$0.00 USD

Taxes, discounts and shipping calculated at checkout.

Welcome to ilikemalware.com

  • Home
  • Research
  • Contact
Log in

    I LIKE MALWARE

    • Home
    • Research
    • Contact
    Log in Cart

    Expert Security Research and Solutions.

    Based in California, we have been at the forefront of industry-leading security research since 2019, delivering innovative insights and solutions.

    Research Articles

    View all
    • US Telecom Companies Hacked

      US Telecom Companies Hacked

      February 10, 2025

      Salt Typhoon is an advanced persistent threat (APT) group believed to be operated by China's Ministry of State Security (MSS). Active since at least 2020, this group has conducted sophisticated...

      US Telecom Companies Hacked

      February 10, 2025

      Salt Typhoon is an advanced persistent threat (APT) group believed to be operated by China's Ministry of State Security (MSS). Active since at least 2020, this group has conducted sophisticated...

    • The AI Arms Race: The Rise of DeepSeek and the Stargate Initiative

      The AI Arms Race: The Rise of DeepSeek and the ...

      January 28, 2025

      The stakes have never been higher, and nations are recognizing the strategic importance of dominating this field. President Trump’s first initiative in office, the Stargate Project, underscores this urgency by committing...

      The AI Arms Race: The Rise of DeepSeek and the ...

      January 28, 2025

      The stakes have never been higher, and nations are recognizing the strategic importance of dominating this field. President Trump’s first initiative in office, the Stargate Project, underscores this urgency by committing...

    • The Rising Threats Against Utilities: A Sobering Recap Of 2024

      The Rising Threats Against Utilities: A Soberin...

      January 27, 2025

      Attacks and threats against utilities are not a new phenomenon, but they are becoming increasingly frequent and sophisticated with each passing year. Early utility systems, such as ICS/SCADA (Industrial Control...

      The Rising Threats Against Utilities: A Soberin...

      January 27, 2025

      Attacks and threats against utilities are not a new phenomenon, but they are becoming increasingly frequent and sophisticated with each passing year. Early utility systems, such as ICS/SCADA (Industrial Control...

    • Everyone should learn Nmap

      Everyone should learn Nmap

      January 23, 2025

      If you’ve ever explored the world of networking, cybersecurity, or ethical hacking, chances are you’ve heard of Nmap, short for Network Mapper. True to its name, Nmap is a powerful...

      Everyone should learn Nmap

      January 23, 2025

      If you’ve ever explored the world of networking, cybersecurity, or ethical hacking, chances are you’ve heard of Nmap, short for Network Mapper. True to its name, Nmap is a powerful...

    1 / of 4
    View all

    Subscribe to our emails

    Be the first to know about new collections and exclusive offers.

    © 2025, I LIKE MALWARE Powered by Shopify
      • Choosing a selection results in a full page refresh.
      • Opens in a new window.