Predator Spyware Operators Rebuild Multi-Tier Infrastructure to Target Mobile Devices
|
|
0
|
452
|
March 1, 2024
|
Malware analysis report: Snake keylogger - part 1
|
|
0
|
526
|
March 1, 2024
|
Building a VM for Reverse Engineering and Malware Analysis! Installing the FLARE-VM
|
|
0
|
727
|
February 29, 2024
|
Recovering data from broken appliance VMDKs
|
|
0
|
529
|
February 29, 2024
|
Russia Seeks to Exploit Western "War Fatigue" to Win in Ukraine
|
|
0
|
552
|
February 29, 2024
|
GUloader Unmasked: Decrypting the Threat of Malicious SVG Files
|
|
0
|
678
|
February 29, 2024
|
2023 Top Vulnerabilities
|
|
0
|
642
|
February 29, 2024
|
Igor’s Tip of the Week #177: Unused argument attribute
|
|
0
|
777
|
February 28, 2024
|
What is Old is New Again: Lessons in Anti-Ransom Policy
|
|
0
|
804
|
February 28, 2024
|
2/28/24 2:37 pm
|
|
0
|
793
|
February 28, 2024
|
New Malicious PyPI Packages used by Lazarus
|
|
0
|
907
|
February 28, 2024
|
Phishing Malware That Sends Stolen Information Using Telegram API
|
|
0
|
1046
|
February 27, 2024
|
IDA 8.4: Qt 5.15.2 sources & build scripts
|
|
0
|
1211
|
February 26, 2024
|
PE-sieve/HollowsHunter with custom signatures (SigFinder)
|
|
0
|
1147
|
February 26, 2024
|
Analysis of Nood RAT Used in Attacks Against Linux (Gh0st RAT’s Variant)
|
|
0
|
1220
|
February 26, 2024
|
Binary Ninja - Fix unresolved stack pointer
|
|
0
|
1357
|
February 25, 2024
|
2024-02-09, 02-22 and 02-23 - Data dump: Latrodectus from Contact Forms campaign
|
|
0
|
1533
|
February 24, 2024
|
Online Scams: Are You Safe From Impersonations, Threats, and Deceptions?
|
|
0
|
1654
|
February 23, 2024
|
TrollAgent That Infects Systems Upon Security Program Installation Process (Kimsuky Group)
|
|
0
|
1690
|
February 23, 2024
|
Malware and cryptography 25: encrypt/decrypt payload via RC6. Simple C/C++ example
|
|
0
|
1776
|
February 22, 2024
|
Unmasking Lorenz Ransomware: A Dive into Recent Tactics, Techniques and Procedures
|
|
0
|
1618
|
February 22, 2024
|
Doppelgänger | Russia-Aligned Influence Operation Targets Germany
|
|
0
|
1617
|
February 22, 2024
|
2024-02-21 - Parrot TDS --> SogGholish --> Aysnc RAT
|
|
0
|
1696
|
February 21, 2024
|
LABScon Replay | Chasing Shadows | The Rise of a Prolific Espionage Actor
|
|
0
|
1726
|
February 21, 2024
|
Continuous Threats Need Continuous Management
|
|
0
|
1706
|
February 21, 2024
|
Igor’s Tip of the Week #176: Handling stack reuse in the decompiler
|
|
0
|
1749
|
February 21, 2024
|
From Word document to Ransomware? Investigate How Template Injection is Used to Execute Macros
|
|
0
|
1701
|
February 21, 2024
|
Unmasking I-Soon | The Leak That Revealed China’s Cyber Operations
|
|
0
|
1493
|
February 21, 2024
|
Story of the H2 2023: In-depth Examination of Notable Ransomware Groups and Key Issues (English ver
|
|
0
|
1563
|
February 21, 2024
|
Story of the H2 2023: Statistical Insights into Ransomware Trends and Impact on Victims (English…
|
|
0
|
1484
|
February 21, 2024
|