Cybersecurity Lifehacks What is Crypto Malware: Definition and Analysis in ANY.RUN February 21, 2024 978 views 6 min read
Malware Analysis A deep dive into .NET malware obfuscators: Part 1 February 12, 2024 4714 views 14 min read
News ZLoader Now Targets 64-bit Systems: Analyze The New Version in ANY.RUN February 8, 2024 2603 views 3 min read
Cybersecurity Lifehacks What is Win32:Malware-gen? Explaining Generic Malware Labels February 6, 2024 4327 views 5 min read
Cybersecurity Lifehacks Linux Malware: Types, Families and Trends January 31, 2024 2536 views 7 min read
Cybersecurity LifehacksNews LockBit Ransomware Attack on Calvià: a Recent Reminder Why Organizations Need Strong Cybersecurity Basics January 29, 2024 1479 views 6 min read
Cybersecurity Lifehacks What Type of Malware Loads Itself Before the OS Boot is Complete? What is a Bootkit? January 23, 2024 1164 views 5 min read
Cybersecurity Lifehacks Which type of malware resides only in RAM? Explaining fileless malware January 11, 2024 3842 views 6 min read
Cybersecurity Lifehacks What are the most common methods cyber attackers use to infect a system with malware? December 12, 2023 1210 views 6 min read
Cybersecurity Lifehacks How ANY.RUN Helps SOC and DFIR Teams: Junior to Senior Specialists December 5, 2023 946 views 5 min read
Malware Analysis 5 malware threats we discovered in the wild in November 2023 November 29, 2023 7982 views 5 min read