Malware Analysis Reverse Engineering Snake Keylogger: Full .NET Malware Analysis Walkthrough March 25, 2024 13493 views 22 min read
News A New Phishing Campaign Deploys STRRAT and VCURMS via GitHub March 20, 2024 1798 views 4 min read
Malware Analysis AsukaStealer: The Next Chapter in ObserverStealer’s Story March 18, 2024 7207 views 11 min read
Cybersecurity Lifehacks How We Process IOCs for ANY.RUN Threat Intelligence Lookup and Feeds March 13, 2024 1683 views 5 min read
Malware Analysis How to Set Up a Network Research Laboratory: MonikerLink (CVE-2024-21413) Case Study March 12, 2024 9948 views 7 min read
News LockBit is Back from the Dead. Here’s How to Prepare For its Return March 7, 2024 1768 views 4 min read
Service Updates Release Notes: Threat Intelligence Lookup, RSPAMD, 26 New Signatures, and More March 4, 2024 1233 views 5 min read
Cybersecurity Lifehacks How to Create a Sandbox Environment (for Malware Analysis) February 29, 2024 17501 views 10 min read
Cybersecurity Lifehacks Analyzing Linux Malware in ANY.RUN: 3 examples February 22, 2024 3555 views 4 min read