We research. You level up.
Malware / Threat analysis
There is a growing trend among malware authors to incorporate legitimate applications in their malicious package. This time, we encountered a malware downloading a legitimate ffmpeg.
We finally have gotten our hands on a sample of Moker Trojan (that was discovered in 2015). This article will be a deep dive in its capabilities.
Cybercrime / Malware
A dropper we analyzed downloaded the code for part of its payload from Pastebin on the fly. The payload turned out to be a RAT with keylogging capabilities.
Mac / Threat analysis
We examine a cross-platform malware with a Mac payload and found the hackers behind it really didn’t put that much effort into making it work on the Mac.
Cybercrime / Social engineering
We have been featuring Steam malware distributed via chat for quite a while now. Yet, we continue to see users fall for the same tactic. Here’s a tip: Trust, but verify.
Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.
Select your language