Cybersecurity Lifehacks Understand Encryption in Malware: From Basics to XOR April 11, 2024 4091 views 3 min read
Malware Analysis Client-Side Exploitation: abusing WebDAV+URL+LNK to Deliver Malicious Payloads April 8, 2024 6761 views 2 min read
Cybersecurity Lifehacks Basic Malware Packers: What are They and How to Analyze Them in ANY.RUN March 28, 2024 8014 views 9 min read
Cybersecurity Lifehacks New BunnyLoader Version Gains Modular Capabilities March 27, 2024 1493 views 3 min read
Malware Analysis Reverse Engineering Snake Keylogger: Full .NET Malware Analysis Walkthrough March 25, 2024 9320 views 22 min read
News A New Phishing Campaign Deploys STRRAT and VCURMS via GitHub March 20, 2024 1734 views 4 min read
Cybersecurity Lifehacks Threat Intelligence Lookup: Combined Search for Precise Investigations March 19, 2024 970 views 7 min read
Malware Analysis AsukaStealer: The Next Chapter in ObserverStealer’s Story March 18, 2024 3727 views 11 min read
Cybersecurity Lifehacks How We Process IOCs for ANY.RUN Threat Intelligence Lookup and Feeds March 13, 2024 1501 views 5 min read
Malware Analysis How to Set Up a Network Research Laboratory: MonikerLink (CVE-2024-21413) Case Study March 12, 2024 7030 views 7 min read
Service Updates Release Notes: Threat Intelligence Lookup, RSPAMD, 26 New Signatures, and More March 4, 2024 1191 views 5 min read