Cybersecurity Lifehacks What is a Common Use Case for Technical Threat Intelligence June 3, 2024 1624 views 5 min read
Cybersecurity Lifehacks Understand Encryption in Malware: AES (Lu0Bot Example) May 30, 2024 1882 views 7 min read
News Vidar, Lumma, Atomic and Octo Delivered through GitHub, FileZilla May 29, 2024 1646 views 3 min read
Cybersecurity Lifehacks Malicious Scripts: Examples and Analysis in ANY.RUN May 23, 2024 4773 views 10 min read
News New Redline Version: Uses Lua Bytecode, Propagates Through GitHub April 30, 2024 2968 views 6 min read
News Cybercriminals Exploit Google Ads to Spread IP Scanner with Concealed Backdoor April 23, 2024 2090 views 5 min read
Service Updates New PowerShell Script Tracer: Analyze PowerShell Execution April 18, 2024 4247 views 8 min read
Cybersecurity Lifehacks Understand Encryption in Malware: From Basics to XOR April 11, 2024 3641 views 3 min read
Malware Analysis Client-Side Exploitation: abusing WebDAV+URL+LNK to Deliver Malicious Payloads April 8, 2024 6002 views 2 min read