We research. You level up.
Malware / Threat analysis
In part two of our series on decoding Emotet, we analyze the PowerShell code flow and structure. We also reconstruct the command-line arguments—for fun!
Write for Labs
Select your language
Your intro to everything relating to cyberthreats, and how to stop them.