John FCharting the IOCsA meta-analysis of C2 locations and tools to help you find your bearings1h ago
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 111
S12 - H4CKPDF Icon File SpoofingWelcome to my new Malware Development post, in this one i wanna show you a simple but useful technique to cheat the victim user to click on…23h ago23h ago
Jean-Pierre LESUEUR (Microsoft MVP)inPhrozenUnderstanding Malware Patching: ResourcesAbstractMay 17May 17
John FCharting the IOCsA meta-analysis of C2 locations and tools to help you find your bearings1h ago
Iglenson SecurityDodging the Guardian: How Malware Evades EDR DetectionsHow evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.Jun 111
S12 - H4CKPDF Icon File SpoofingWelcome to my new Malware Development post, in this one i wanna show you a simple but useful technique to cheat the victim user to click on…23h ago
SuhailmalikFlareVM Malware Analysis Lab: Setup and OperationWelcome to the FlareVM Malware Analysis Lab article! In this guide, we’ll explore how to set up, configure, and operate a malware analysis…Mar 20
Rakesh KrishnaninCoinmonksMEDUSA RANSOMWARE: SETTING STRONG FOOTHOLDNOTE: Not to be confused with Medusa Locker Ransomware or Medusa Stealer as they differ from this Ransomware variant. Many reports had…1d ago
Xavier Mirabelli-MontaninXavier Mirabelli-Montan’s BlogMacOS users beware! AMOS TrojanA couple of weeks ago, I experienced a first — a trojan horse on MacOS, and it wasn’t pretty…Oct 4, 202320