Predator Spyware Operators Rebuild Multi-Tier Infrastructure to Target Mobile Devices
|
|
0
|
447
|
March 1, 2024
|
Malware analysis report: Snake keylogger - part 1
|
|
0
|
502
|
March 1, 2024
|
Building a VM for Reverse Engineering and Malware Analysis! Installing the FLARE-VM
|
|
0
|
717
|
February 29, 2024
|
Recovering data from broken appliance VMDKs
|
|
0
|
522
|
February 29, 2024
|
Russia Seeks to Exploit Western "War Fatigue" to Win in Ukraine
|
|
0
|
548
|
February 29, 2024
|
GUloader Unmasked: Decrypting the Threat of Malicious SVG Files
|
|
0
|
672
|
February 29, 2024
|
2023 Top Vulnerabilities
|
|
0
|
631
|
February 29, 2024
|
Igor’s Tip of the Week #177: Unused argument attribute
|
|
0
|
770
|
February 28, 2024
|
What is Old is New Again: Lessons in Anti-Ransom Policy
|
|
0
|
797
|
February 28, 2024
|
2/28/24 2:37 pm
|
|
0
|
790
|
February 28, 2024
|
New Malicious PyPI Packages used by Lazarus
|
|
0
|
899
|
February 28, 2024
|
Phishing Malware That Sends Stolen Information Using Telegram API
|
|
0
|
1039
|
February 27, 2024
|
IDA 8.4: Qt 5.15.2 sources & build scripts
|
|
0
|
1199
|
February 26, 2024
|
PE-sieve/HollowsHunter with custom signatures (SigFinder)
|
|
0
|
1145
|
February 26, 2024
|
Analysis of Nood RAT Used in Attacks Against Linux (Gh0st RAT’s Variant)
|
|
0
|
1217
|
February 26, 2024
|
Binary Ninja - Fix unresolved stack pointer
|
|
0
|
1344
|
February 25, 2024
|
2024-02-09, 02-22 and 02-23 - Data dump: Latrodectus from Contact Forms campaign
|
|
0
|
1528
|
February 24, 2024
|
Online Scams: Are You Safe From Impersonations, Threats, and Deceptions?
|
|
0
|
1652
|
February 23, 2024
|
TrollAgent That Infects Systems Upon Security Program Installation Process (Kimsuky Group)
|
|
0
|
1683
|
February 23, 2024
|
Malware and cryptography 25: encrypt/decrypt payload via RC6. Simple C/C++ example
|
|
0
|
1768
|
February 22, 2024
|
Unmasking Lorenz Ransomware: A Dive into Recent Tactics, Techniques and Procedures
|
|
0
|
1612
|
February 22, 2024
|
Doppelgänger | Russia-Aligned Influence Operation Targets Germany
|
|
0
|
1609
|
February 22, 2024
|
2024-02-21 - Parrot TDS --> SogGholish --> Aysnc RAT
|
|
0
|
1691
|
February 21, 2024
|
LABScon Replay | Chasing Shadows | The Rise of a Prolific Espionage Actor
|
|
0
|
1724
|
February 21, 2024
|
Continuous Threats Need Continuous Management
|
|
0
|
1700
|
February 21, 2024
|
Igor’s Tip of the Week #176: Handling stack reuse in the decompiler
|
|
0
|
1737
|
February 21, 2024
|
From Word document to Ransomware? Investigate How Template Injection is Used to Execute Macros
|
|
0
|
1697
|
February 21, 2024
|
Unmasking I-Soon | The Leak That Revealed China’s Cyber Operations
|
|
0
|
1485
|
February 21, 2024
|
Story of the H2 2023: In-depth Examination of Notable Ransomware Groups and Key Issues (English ver
|
|
0
|
1544
|
February 21, 2024
|
Story of the H2 2023: Statistical Insights into Ransomware Trends and Impact on Victims (English…
|
|
0
|
1474
|
February 21, 2024
|