Cybersecurity Lifehacks What is Crypto Malware: Definition and Analysis in ANY.RUN February 21, 2024 1435 views 6 min read
Malware Analysis A deep dive into .NET malware obfuscators: Part 1 February 12, 2024 6275 views 14 min read
News ZLoader Now Targets 64-bit Systems: Analyze The New Version in ANY.RUN February 8, 2024 2782 views 3 min read
Cybersecurity Lifehacks What is Win32:Malware-gen? Explaining Generic Malware Labels February 6, 2024 7852 views 5 min read
Cybersecurity Lifehacks Linux Malware: Types, Families and Trends January 31, 2024 3548 views 7 min read
Malware Analysis CrackedCantil: A Malware Symphony Breakdown January 30, 2024 11312 views 25 min read
Cybersecurity LifehacksNews LockBit Ransomware Attack on Calvià: a Recent Reminder Why Organizations Need Strong Cybersecurity Basics January 29, 2024 1755 views 6 min read
Cybersecurity Lifehacks What Type of Malware Loads Itself Before the OS Boot is Complete? What is a Bootkit? January 23, 2024 1374 views 5 min read
Cybersecurity Lifehacks Which type of malware resides only in RAM? Explaining fileless malware January 11, 2024 4987 views 6 min read
Cybersecurity Lifehacks What are the most common methods cyber attackers use to infect a system with malware? December 12, 2023 1472 views 6 min read
Cybersecurity Lifehacks How ANY.RUN Helps SOC and DFIR Teams: Junior to Senior Specialists December 5, 2023 1328 views 5 min read