g0njxaThe journey into Mac OS infostealersIn the past weeks I interviewed some of the Mac OS malware operators that are most known in the wild. Mac OS infostealers are still a trend…22h ago
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 112
RED TEAMMalware Development : Part 1Where do I start, and what are all the things I need to learn.Mar 71Mar 71
S12 - H4CKReverse engineering a Java programHello folks, today let’s talk about reverse engineering, in more specific way reverse engineering programs that run on the JVM. As is well…19h ago19h ago
Jean-Pierre LESUEUR (Microsoft MVP)inPhrozenUnderstanding Malware Patching: ResourcesAbstractMay 17May 17
g0njxaThe journey into Mac OS infostealersIn the past weeks I interviewed some of the Mac OS malware operators that are most known in the wild. Mac OS infostealers are still a trend…22h ago
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 112
RED TEAMMalware Development : Part 1Where do I start, and what are all the things I need to learn.Mar 71
S12 - H4CKReverse engineering a Java programHello folks, today let’s talk about reverse engineering, in more specific way reverse engineering programs that run on the JVM. As is well…19h ago
Andrew PetrusCobalt Strike Beacon Malware AnalysisI recently picked up a Cobalt Strike sample from Malware Bazaar in the form of a Windows installer file (MSI) and I wanted to share how I…18h ago
Xavier Mirabelli-MontaninXavier Mirabelli-Montan’s BlogMacOS users beware! AMOS TrojanA couple of weeks ago, I experienced a first — a trojan horse on MacOS, and it wasn’t pretty…Oct 4, 202320