Service Updates Collect and Use IOCs from Malware Configs in TI Lookup July 29, 2024 1924 views 4 min read
Instructions on ANY.RUN See Malicious Process Relationships on a Visual Graph July 25, 2024 1562 views 4 min read
Cybersecurity Lifehacks What Are the 3 Types of Threat Intelligence Data July 17, 2024 1918 views 4 min read
Malware Analysis Analyzing Malware Protected with Themida and VMprotect: Is It Really That Hard? June 18, 2024 5888 views 7 min read
News Cybercriminals Exploit Cloudflare Workers and HTML Smuggling in New Phishing Campaign June 12, 2024 1685 views 6 min read
News Vidar, Lumma, Atomic and Octo Delivered through GitHub, FileZilla May 29, 2024 1627 views 3 min read
News New Hijack Loader Variant: Uses Process Hollowing, Has Enhanced Anti-Evasion Capabilities May 20, 2024 2159 views 3 min read
Malware Analysis Client-Side Exploitation: abusing WebDAV+URL+LNK to Deliver Malicious Payloads April 8, 2024 5943 views 2 min read
Instructions on ANY.RUN Quickly Check if a Sample is Malicious with ANY.RUN’s Process Tree April 4, 2024 2824 views 7 min read