C WinSystem WeaknessLeveraging Hash Values for Enhanced Cybersecurity and Malware Detection3 min read·1 day ago--
Xavier Mirabelli-MontaninXavier Mirabelli-Montan’s BlogMacOS users beware! AMOS TrojanA couple of weeks ago, I experienced a first — a trojan horse on MacOS, and it wasn’t pretty…6 min read·Oct 4, 2023--19
S12 - H4CKKeylogger in Web RATWelcome to my new article today i will show you the new feature of my RAT malware, tell you that this is one of the last features of the…10 min read·1 day ago----
Jean-Pierre LESUEUR (Microsoft MVP)inPhrozenA Malware retrospective: PrjRAPTORIn our new “Malware Retrospective,” we explore PrjRAPTOR, a 2008–09 VB6 Remote Access Trojan.9 min read·Sep 12, 2023--2--2
C WinSystem WeaknessLeveraging Hash Values for Enhanced Cybersecurity and Malware Detection3 min read·1 day ago--
Xavier Mirabelli-MontaninXavier Mirabelli-Montan’s BlogMacOS users beware! AMOS TrojanA couple of weeks ago, I experienced a first — a trojan horse on MacOS, and it wasn’t pretty…6 min read·Oct 4, 2023--19
S12 - H4CKKeylogger in Web RATWelcome to my new article today i will show you the new feature of my RAT malware, tell you that this is one of the last features of the…10 min read·1 day ago--
Jean-Pierre LESUEUR (Microsoft MVP)inPhrozenA Malware retrospective: PrjRAPTORIn our new “Malware Retrospective,” we explore PrjRAPTOR, a 2008–09 VB6 Remote Access Trojan.9 min read·Sep 12, 2023--2
Mohit DamkeMalware Analysis | Building Lab | Static & Dynamic | By Mohit DamkeMalware Analysis | Building Lab | Static & Dynamic | By Mohit Damke13 min read·Jan 14, 2024--
Scott Bolen | RONIN OWL CTIThreat Intelligence Report: Scattered Spider CampaignsRonin Owl3 min read·2 days ago--
Jean-Pierre LESUEUR (Microsoft MVP)inPhrozenA Malware retrospective: SubSevenIn our “Malware Retrospective” series, we delve into the captivating history of SubSeven, a landmark Remote Access Trojan15 min read·Jul 18, 2023--3