Cloud Malware | A Threat Hunter’s Guide to Analysis, Techniques and Delivery
Learn about cloud threats, how to hunt for them and how to analyze them in this post based on Alex Delamotte's recent LABScon workshop.
Read More
Learn about cloud threats, how to hunt for them and how to analyze them in this post based on Alex Delamotte's recent LABScon workshop.
We teamed up with VirusTotal to take a deep dive into the platform's extensive query capabilities through both the web and API interfaces.
Explore how revisiting past cyber incidents can empower defenders and help to anticipate future threats more effectively.
An emerging infostealer being sold on Telegram looks to harness generative AI to streamline cyber attacks on cloud services.
Simplifying radare2 for macOS malware research, these tips and tricks will help to improve workflow and supercharge productivity.
Massive malware binaries are becoming more common on macOS and can cause problems for detection and analysis. Here's how we can successfully deal with them.
Learn how to drive radare2 with r2pipe for automated binary analysis, string decryption and other common reversing tasks.
Learn how to customize radare2 with user-defined aliases, macros and functions for faster and easier binary diffing and analysis.
ChatGPT has captured the imagination of many across infosec. Here's how it can superpower the efforts of reversers and malware analysts.
Learn how threat actors manipulate Windows to install malicious apps that are trusted by the system, and how to defend against them.