Cybersecurity Lifehacks Captchas, QR codes, and Clever Evasion: New Phishing Tactics are Gaining Traction October 11, 2023 7732 views 6 min read
Malware Analysis Analyzing Snake Keylogger in ANY.RUN: a Full Walkthrough October 5, 2023 8356 views 14 min read
Service Updates We Redesigned Static Discovery: Introducing In-Depth Static Analysis for Various File Types October 4, 2023 2277 views 4 min read
Malware Analysis Analyzing Lu0Bot: A Node.js Malware with Near-Unlimited Capabilities September 26, 2023 10420 views 12 min read
Cybersecurity Lifehacks Malware Analysis for Keeping Up with the Latest Threats: Lessons from ANY.RUN September 19, 2023 2205 views 8 min read
Cybersecurity Lifehacks How to Use Interactivity in a Malware Sandbox September 6, 2023 4531 views 5 min read
Service Updates Release Notes: New Config Extractors, Suricata Rules, and More August 31, 2023 2913 views 7 min read
Malware Analysis XWorm: Technical Analysis of a New Malware Version August 24, 2023 11637 views 6 min read
Service Updates Release Notes: Digital Signatures, New Network rules, and More July 27, 2023 3579 views 7 min read
Malware Analysis Analyzing a New .NET variant of LaplasClipper: retrieving the config July 20, 2023 9485 views 8 min read
Service Updates Identify Suspicious or Tampered Files Faster with Digital Signatures July 18, 2023 3128 views 4 min read