Malware Analysis Inside agenteV2: How Brazilian Attackers Use Fake Court Summons to Steal Banking Credentials in Real Time April 24, 2026 9720 views 22 min read
Malware Analysis From Forgotten Tool to Powerful Pivot: Using JA3 to Expose Attackers’ Infrastructure January 21, 2026 9610 views 7 min read
Cybersecurity Lifehacks How to Grow SOC Team Expertise for Ultimate Triage & Response Speed October 8, 2025 1676 views 7 min read
Cybersecurity Lifehacks MSSP Growth Guide: Scaling Threat Detection for Expanding Client Base August 27, 2025 2820 views 6 min read
Cybersecurity Lifehacks How SOC Teams Save Time and Effort with ANY.RUN: Action Plan June 10, 2025 1865 views 11 min read
Cybersecurity Lifehacks How Threat Intelligence Feeds Help During Incident Response April 23, 2025 4244 views 8 min read
Analyst Training Decoding a Malware Analyst: Essential Skills and Expertise March 19, 2025 2566 views 5 min read
Cybersecurity Lifehacks Threat Intelligence Pivoting: Actionable Insights Behind Indicators January 14, 2025 2889 views 7 min read
Interviews Expert Q&A: Dr. Jim Furstenberg on Cybersecurity Education and Practice November 5, 2024 2372 views 12 min read
Instructions on ANY.RUN Tools and Technologies ANY.RUN Uses to Protect Privacy of Enterprise Clients May 7, 2024 4280 views 7 min read
Analyst Training Understanding Macros in Malware: Types, Capabilities, Case Study February 20, 2024 4875 views 11 min read
Cybersecurity Lifehacks What is the difference between malware and viruses? December 26, 2023 1905 views 5 min read