Malware Analysis Zero-day Attack Uses Corrupted Files to Bypass Detection: Technical Analysis December 5, 2024 10621 views 7 min read
Instructions on ANY.RUN Search Operators and Wildcards for Cyber Threat Investigations December 4, 2024 4197 views 9 min read
Service Updates Release Notes: MITRE ATT&CK Matrix with Samples, Upgraded Automated Interactivity, Expanded Threat Coverage, and More December 3, 2024 2519 views 6 min read
Malware Analysis PSLoramyra: Technical Analysis of Fileless Malware Loader November 27, 2024 7014 views 7 min read
Cybersecurity Lifehacks Investigating Phishing Threats with TI Lookup: Use Cases from an Expert November 26, 2024 2884 views 8 min read
Service Updates Explore MITRE ATT&CK Techniques in Real-World Samples with TI Lookup November 21, 2024 5203 views 5 min read
Cybersecurity Lifehacks 6 Common Persistence Mechanisms in Malware November 20, 2024 5568 views 9 min read
Cybersecurity Lifehacks How to Improve Threat Investigations with TI Lookup: Webinar Recap November 12, 2024 2101 views 7 min read
Malware Analysis AsyncRAT’s Infection Tactics via Open Directories: Technical Analysis November 7, 2024 4351 views 8 min read