We research. You level up.
Cybercrime / Social engineering
Tech support scammers up the ante with malware-like screen lockers.
101 / How-tos
We give you a short introduction to Process Explorer and showed you a few ways to use it when you are trying to identify a possible malware problem with your Windows system.
Malware / Threat analysis
We take a deep-dive into the world of Petya Ransomware.
Cybercrime / Mac
The first Mac ransomware, called KeRanger, was found infecting the Transmission BitTorrent client and will begin encrypting hard drives today!
Cybercrime / Malware
With the returned popularity of visual basic as a first attack vector in mind, we took a look at de-obfuscating a few recent vbs files starting with a very easy one and progressing to a lot more complex script.
Select your language