Cybersecurity Lifehacks A Guide to Common Encryption Algorithms in Modern Malware July 10, 2024 5509 views 7 min read
Service Updates Search for Network Threats by Suricata in TI Lookup July 9, 2024 3303 views 3 min read
Service Updates Release notes: Mutexes in TI Lookup, new YARA rules, extractors, and more July 3, 2024 1657 views 3 min read
Malware Analysis Analysis of the Phishing Campaign: Behind the Incident June 26, 2024 17567 views 13 min read
Malware Analysis Analyzing Malware Protected with Themida and VMprotect: Is It Really That Hard? June 18, 2024 14589 views 7 min read
Service Updates Search for Malware Mutexes in ANY.RUN Threat Intelligence Lookup June 13, 2024 4055 views 3 min read
News Cybercriminals Exploit Cloudflare Workers and HTML Smuggling in New Phishing Campaign June 12, 2024 2364 views 6 min read
Cybersecurity Lifehacks How to Write a Comprehensive Malware Analysis Report June 6, 2024 5031 views 5 min read
Cybersecurity Lifehacks What is a Common Use Case for Technical Threat Intelligence June 3, 2024 2107 views 5 min read
Cybersecurity Lifehacks Understand Encryption in Malware: AES (Lu0Bot Example) May 30, 2024 2641 views 7 min read