Posts tagged Malware

Threat Research
A Bag of RATs: VenomRAT vs. AsyncRAT

Detection and Response
Introspective Intelligence: Understanding Detection Techniques

Vulnerabilities and Exploits
ByeBye Shell and the Targeting of Pakistan

Threat Research
Analysis of the FinFisher Lawful Interception Malware

Thought Leadership
Why Cybercriminals Are Not Necessarily Embracing AI

Vulnerabilities and Exploits
Cuckoo Sandbox 0.4 Simplifies Malware Analysis with KVM support, Signatures and Extended Modularity

Exposure Management
Update on SolarWinds Supply-Chain Attack: SUNSPOT, SUNSHUTTLE and New Malware Family Associations

Detection and Response
Stories from the SOC Part 2: MSIX Installer Utilizes Telegram Bot to Execute IDAT Loader

Threat Research