Cybersecurity Lifehacks What Are the 3 Types of Threat Intelligence Data July 17, 2024 2227 views 4 min read
Malware Analysis Analyzing Malware Protected with Themida and VMprotect: Is It Really That Hard? June 18, 2024 12162 views 7 min read
News Cybercriminals Exploit Cloudflare Workers and HTML Smuggling in New Phishing Campaign June 12, 2024 2059 views 6 min read
News Vidar, Lumma, Atomic and Octo Delivered through GitHub, FileZilla May 29, 2024 1998 views 3 min read
News New Hijack Loader Variant: Uses Process Hollowing, Has Enhanced Anti-Evasion Capabilities May 20, 2024 2516 views 3 min read
Malware Analysis Client-Side Exploitation: abusing WebDAV+URL+LNK to Deliver Malicious Payloads April 8, 2024 15766 views 2 min read
Instructions on ANY.RUN Quickly Check if a Sample is Malicious with ANY.RUN’s Process Tree April 4, 2024 3975 views 7 min read
Malware Analysis Reverse Engineering Snake Keylogger: Full .NET Malware Analysis Walkthrough March 25, 2024 13488 views 22 min read
News A New Phishing Campaign Deploys STRRAT and VCURMS via GitHub March 20, 2024 1798 views 4 min read
Malware Analysis AsukaStealer: The Next Chapter in ObserverStealer’s Story March 18, 2024 7207 views 11 min read