Uncategorized See Malicious Process Relationships on a Visual Graph July 25, 2024 180 views 4 min read
Cybersecurity Lifehacks What Are the 3 Types of Threat Intelligence Data July 17, 2024 674 views 4 min read
Malware Analysis Analyzing Malware Protected with Themida and VMprotect: Is It Really That Hard? June 18, 2024 2538 views 7 min read
News Cybercriminals Exploit Cloudflare Workers and HTML Smuggling in New Phishing Campaign June 12, 2024 981 views 6 min read
News Vidar, Lumma, Atomic and Octo Delivered through GitHub, FileZilla May 29, 2024 1025 views 3 min read
News New Hijack Loader Variant: Uses Process Hollowing, Has Enhanced Anti-Evasion Capabilities May 20, 2024 1365 views 3 min read
Malware Analysis Client-Side Exploitation: abusing WebDAV+URL+LNK to Deliver Malicious Payloads April 8, 2024 3406 views 1 min read
Instructions on ANY.RUN Quickly Check if a Sample is Malicious with ANY.RUN’s Process Tree April 4, 2024 811 views 7 min read
Malware Analysis Reverse Engineering Snake Keylogger: Full .NET Malware Analysis Walkthrough March 25, 2024 4087 views 22 min read