Malware Analysis From Forgotten Tool to Powerful Pivot: Using JA3 to Expose Attackers’ Infrastructure January 21, 2026 1908 views 7 min read
Reports Malware Trends Report 2025: New Security Risks for Businesses in 2026 January 20, 2026 5194 views 8 min read
Service Updates Threat Coverage Digest: New Malware Reports and 5K+ Detection Rules December 1, 2025 1442 views 4 min read
Cybersecurity Lifehacks ClickFix Explosion: Cross-Platform Social Engineering Turns Users Into Malware Installers November 12, 2025 21995 views 9 min read
Malware Analysis New Malware Tactics: Cases & Detection Tips for SOCs and MSSPs October 14, 2025 36057 views 11 min read
Guest Posts Phishing, Cloud Abuse, and Evasion: Advanced OSINT Investigation with ANY.RUN Threat Intelligence October 7, 2025 29456 views 9 min read
Malware Analysis FunkSec’s FunkLocker: How AI Is Powering the Next Wave of Ransomware October 1, 2025 14801 views 10 min read
Malware Analysis Fighting Telecom Cyberattacks: Investigating a Campaign Against UK Companies September 24, 2025 38432 views 10 min read
Malware Analysis Lazarus Group Attacks in 2025: Here’s Everything SOC Teams Need to Know September 10, 2025 15979 views 9 min read
Malware Analysis Salty 2FA: Undetected PhaaS from Storm-1575 Hitting US and EU Industries August 19, 2025 60208 views 12 min read
Malware Analysis Major Cyber Attacks in July 2025: Obfuscated .LNK‑Delivered DeerStealer, Fake 7‑Zip, and More July 29, 2025 10551 views 7 min read
Service Updates Free. Powerful. Actionable. Make Smarter Security Decisions with Live Attack Data July 16, 2025 5236 views 8 min read