July 3, 2018 - A web miner injected into compromised sites is just the tip of the iceberg for an infrastructure hosting malicious Windows and Linux coin miners.
July 2, 2018 - The latest macro-less technique to distribute malware via Office documents does not involve exploits. Just a little bit of social engineering.
June 19, 2018 - SamSam ransomware is a unique malware for its explicit human interaction on selected targets and care to erase most of its tracks.
June 7, 2018 - In part two of our series on decoding Emotet, we analyze the PowerShell code flow and structure. We also reconstruct the command-line arguments—for fun!
May 31, 2018 - We take a look at Instagram story spam leading to a "free Apple Watch" giveaway on a recently compromised celebrity account.
May 25, 2018 - In the first part of this two-part analysis of Emotet, we look at the VBA code, where you'll learn how to recognize and discard "dead" code thrown in to complicate the analysis process.
May 22, 2018 - New Mac cryptominer malware is using the XMRig library to mine Monero on infected Macs.