Instructions on ANY.RUN How to Collect Indicators of Compromise in the ANY.RUN Sandbox October 1, 2024 3034 views 4 min read
Malware Analysis How to Intercept Data Exfiltrated by Malware via Telegram and Discord September 25, 2024 10304 views 13 min read
Service Updates Introducing Safebrowsing: Explore Suspicious Links in a Safe Virtual Browser September 24, 2024 20815 views 5 min read
News Kransom Ransomware: New Threat Using DLL-Sideloading to Hijack Popular RPG September 23, 2024 3284 views 4 min read
Cybersecurity Lifehacks What is Spearphishing: Definition, Techniques, Real-world Example September 19, 2024 2579 views 6 min read
Instructions on ANY.RUN How to Collect Threat Intelligence Using Search Parameters in TI Lookup September 18, 2024 5579 views 9 min read
Instructions on ANY.RUN How to Analyze Malware in ANY.RUN Sandbox: Eric Parker’s Guide September 11, 2024 3609 views 5 min read
Cybersecurity Lifehacks Understanding Threat Intelligence Benefits for a Business September 5, 2024 2636 views 8 min read
Service Updates Release Notes: New YARA Rules, Signatures, Config Extractors, and More September 3, 2024 2480 views 3 min read