Service Updates Release notes: Mutexes in TI Lookup, new YARA rules, extractors, and more July 3, 2024 1317 views 3 min read
Malware Analysis Analysis of the Phishing Campaign: Behind the Incident June 26, 2024 9887 views 13 min read
Malware Analysis Analyzing Malware Protected with Themida and VMprotect: Is It Really That Hard? June 18, 2024 5896 views 7 min read
Service Updates Search for Malware Mutexes in ANY.RUN Threat Intelligence Lookup June 13, 2024 3012 views 3 min read
News Cybercriminals Exploit Cloudflare Workers and HTML Smuggling in New Phishing Campaign June 12, 2024 1688 views 6 min read
Cybersecurity Lifehacks How to Write a Comprehensive Malware Analysis Report June 6, 2024 3379 views 5 min read
Cybersecurity Lifehacks What is a Common Use Case for Technical Threat Intelligence June 3, 2024 1606 views 5 min read
Cybersecurity Lifehacks Understand Encryption in Malware: AES (Lu0Bot Example) May 30, 2024 1847 views 7 min read
News Vidar, Lumma, Atomic and Octo Delivered through GitHub, FileZilla May 29, 2024 1629 views 3 min read
Cybersecurity Lifehacks Malicious Scripts: Examples and Analysis in ANY.RUN May 23, 2024 4657 views 10 min read