Malware with Packer Deception Techniques

Find out how malware fools common file scanners.

Read more

Malicious Messages Foray Facebook

A trojan is circulating through Facebook stealing accounts and (probably) taking creds.

Read more

Observing COM within Malicious Code

How malware leverages the Component Object Model

Read more

Using Good Code for Bad Things

See how malware takes good code and makes it bad.

Read more

How to Unpack a Self-Injecting Citadel Trojan

A ‘how-to’ guide on unveiling the Citadel Trojan’s code.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language