Cybersecurity Lifehacks A Guide to Common Encryption Algorithms in Modern Malware July 10, 2024 5069 views 7 min read
Service Updates Search for Network Threats by Suricata in TI Lookup July 9, 2024 3093 views 3 min read
Service Updates Release notes: Mutexes in TI Lookup, new YARA rules, extractors, and more July 3, 2024 1505 views 3 min read
Malware Analysis Analysis of the Phishing Campaign: Behind the Incident June 26, 2024 15404 views 13 min read
Malware Analysis Analyzing Malware Protected with Themida and VMprotect: Is It Really That Hard? June 18, 2024 12182 views 7 min read
Service Updates Search for Malware Mutexes in ANY.RUN Threat Intelligence Lookup June 13, 2024 3598 views 3 min read
News Cybercriminals Exploit Cloudflare Workers and HTML Smuggling in New Phishing Campaign June 12, 2024 2059 views 6 min read
Cybersecurity Lifehacks How to Write a Comprehensive Malware Analysis Report June 6, 2024 4374 views 5 min read
Cybersecurity Lifehacks What is a Common Use Case for Technical Threat Intelligence June 3, 2024 1878 views 5 min read
Cybersecurity Lifehacks Understand Encryption in Malware: AES (Lu0Bot Example) May 30, 2024 2328 views 7 min read