We research. You level up.
A week in security
Our weekly security roundup for January 13-19, with a look at elastic servers, data enrichment, rootkits, regulation for deepfakes, and more.
Rootkit attacks are considered one of the most dangerous cyberthreats today. Learn what they are, how they infect systems, and how to protect against them.
The final episode of our adware series talks specifically about the tools that we use in identifying adware and the places where it lurks on a system.
In this part of the series, we are going to have a look at types of adware that are very hard to find and remove, like ADS, rootkits, and file-less infections.
Adware loves to use Scheduled Tasks and Windows services as a timer to show you their advertisements at set intervals. This post tells you how to delete and disable them.
Part 3 in this series deals with removing programs and files responsible for the unsolicited advertisements.
In part 2 of our adware series, we focus on a few methods to reroute, intercept, and change your internet traffic.
Security world / Week in security
A compilation of notable security news and blog posts from the 4th of December to the 10th. This week, we talked about DGA, a rootkit, another malvertising campaign, and a fake news about “smart drugs”.
Malware / Threat analysis
In this article, we will have a case study of a simple userland rootkit, that uses a technique of API redirection in order to hide own presence from the popular monitoring tools.
Cybercrime / Malware
With the newest release of Malwarebytes Anti-Rootkit, Poweliks malware doesn’t stand a chance.
Write for Labs
Select your language
Your intro to everything relating to cyberthreats, and how to stop them.