Cybersecurity researchers have shed light on the command-and-control (C2) server workings of a known malware family called SystemBC. “SystemBC can be purchased...
Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an effort to make analysis more challenging....
The Russia-linked hacking crew known as Turla has been observed using an updated version of a known second-stage backdoor referred to as...
Nowadays, more malware developers are using unconventional programming languages to bypass advanced detection systems. The Node.js malware Lu0Bot is a testament to...
A new analysis of Raspberry Robin’s attack infrastructure has revealed that it’s possible for other threat actors to repurpose the infections for...
Malware analysis tools are highly essential for Security Professionals who always need to learn many tools, techniques, and concepts to analyze sophisticated...
An advanced malware downloader named GuLoader has recently been exposed by cybersecurity researchers at CrowdStrike. This advanced downloader has the capability to...
Proofpoint researchers report the detection of a new variant of remote access Trojan (RAT) characterized by the use of multiple techniques and...
A prototype version of the Package Analysis tool has been recently released by the Open Source Security Foundation (OpenSSF), and it is...
An 18-month-long analysis of the PYSA ransomware operation has revealed that the cybercrime cartel followed a five-stage software development cycle from August...
Before hunting malware, every researcher needs to find a system where to analyze it. There are several ways to do it: build...
The fight against malware has taken another angle. Cybersecurity experts found a way to detect reused malware, improving malware analysis. In this...
The automatic analysis of potential security flaws has become one of the essential tasks for developers, researchers and experts in vulnerability assessment,...
Behavioural analysis uses machine learning, artificial intelligence, big data, and analytics to recognize malicious behavior by examining differences in everyday activities. Behavioural...
Remote access Trojans (RATs) are one of the most popular hacking tools, as they allow attackers to remotely control a compromised system....
Security researchers from the threat hunting and intelligence company Group-IB have revealed that in 2020, at least two espionage groups from China...
Certified Malware Analyst: In 2020, sophisticated Cyber attacks keep on increasing by APT threats that target most of the enterprise-level networks and...
Aura is a static analysis framework developed as a response to the ever-increasing threat of malicious packages and vulnerable code published...
The cyberattack, which affected 14 inboxes belonging to the Department of Justice, was confirmed by ESET researchers
XSpear XSpear is XSS Scanner on ruby gems Key features Pattern matching based XSS scanning Detect alert confirm prompt event on headless browser (with Selenium) Testing...
truegaze A static analysis tool for Android and iOS applications focusing on security issues outside the source code such as resource strings,...