We research. You level up.
News & Press
Malware / Threat analysis
In part two of our series on decoding Emotet, we analyze the PowerShell code flow and structure. We also reconstruct the command-line arguments—for fun!
Security world / Week in security
A roundup of the security news from April 09 – April 16, including fake updates, safe messaging, and Facebook spammers. And our quarterly CTNT report is out.
A roundup of notable security news from March 26 to April 1, including data breaches, encryption, exploit kits, and more.
In this part of the encryption 101 series, we will begin wrapping it up by going into detail on a ransomware with weak encryption and walking through step-by-step the thought process of creating a decryptor for it.
A roundup of notable security news from March 5 to 11, including another takedown of GeekHelp tech support scammers, a lame Android app, AI and ML in cybersecurity, Mac malware, and more.
Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.
Select your language