News New Redline Version: Uses Lua Bytecode, Propagates Through GitHub April 30, 2024 1703 views 6 min read
News Cybercriminals Exploit Google Ads to Spread IP Scanner with Concealed Backdoor April 23, 2024 1312 views 5 min read
Service Updates New PowerShell Script Tracer: Analyze PowerShell Execution April 18, 2024 1197 views 8 min read
Cybersecurity Lifehacks Understand Encryption in Malware: From Basics to XOR April 11, 2024 1197 views 3 min read
Malware Analysis Client-Side Exploitation: abusing WebDAV+URL+LNK to Deliver Malicious Payloads April 8, 2024 2454 views 1 min read
Cybersecurity Lifehacks Basic Malware Packers: What are They and How to Analyze Them in ANY.RUN March 28, 2024 1716 views 9 min read
Cybersecurity Lifehacks New BunnyLoader Version Gains Modular Capabilities March 27, 2024 759 views 3 min read
Malware Analysis Reverse Engineering Snake Keylogger: Full .NET Malware Analysis Walkthrough March 25, 2024 3149 views 22 min read
News A New Phishing Campaign Deploys STRRAT and VCURMS via GitHub March 20, 2024 1077 views 4 min read
Cybersecurity Lifehacks Threat Intelligence Lookup: Combined Search for Precise Investigations March 19, 2024 508 views 7 min read
Malware Analysis AsukaStealer: The Next Chapter in ObserverStealer’s Story March 18, 2024 2182 views 11 min read