Cybersecurity Lifehacks What are TTPs: Tactics, Techniques and Procedures July 30, 2024 5440 views 10 min read
Service Updates Collect and Use IOCs from Malware Configs in TI Lookup July 29, 2024 2661 views 4 min read
Instructions on ANY.RUN See Malicious Process Relationships on a Visual Graph July 25, 2024 2476 views 4 min read
Malware Analysis Brute Ratel C4 Badger Used to Load Latrodectus July 24, 2024 12457 views 12 min read
Cybersecurity Lifehacks What Are the 3 Types of Threat Intelligence Data July 17, 2024 2659 views 4 min read
Malware Analysis Analyzing Malware Protected with Themida and VMprotect: Is It Really That Hard? June 18, 2024 14872 views 7 min read
News Cybercriminals Exploit Cloudflare Workers and HTML Smuggling in New Phishing Campaign June 12, 2024 2455 views 6 min read
News Vidar, Lumma, Atomic and Octo Delivered through GitHub, FileZilla May 29, 2024 2194 views 3 min read
News New Hijack Loader Variant: Uses Process Hollowing, Has Enhanced Anti-Evasion Capabilities May 20, 2024 3246 views 3 min read
Malware Analysis Client-Side Exploitation: abusing WebDAV+URL+LNK to Deliver Malicious Payloads April 8, 2024 17022 views 2 min read