Malware analysis
![](/siteassets/Theme/Marketing/images/assets/no-image.png?width=338&height=304&rmode=Max&bgcolor=transparent)
Malware analysis
How AsyncRAT is escaping security defenses
Learn more about the popular and dangerous AsyncRAT malware.
![](/contentassets/b15983d7a250429788cffebff03de394/101922-4.png?width=338&height=304&rmode=Max&bgcolor=transparent)
Malware analysis
Chrome extensions used to steal users' secrets
Learn how Chrome extensions are being used for nefarious purposes.
![](/contentassets/a0aad7ac640a433c845daf156846b661/092822-3.png?width=338&height=304&rmode=Max&bgcolor=transparent)
Malware analysis
Luna ransomware encrypts Windows, Linux and ESXi systems
Criminals use the Rust and Goland programming languages to develop new threats.
![](/contentassets/6c48eb7b92cf40da8fe3dd7ff8438e41/092122-3.png?width=338&height=304&rmode=Max&bgcolor=transparent)
Malware analysis
Bahamut Android malware and its new features
Learn all about the Bahamut malware that is once again infecting devices.
![](/contentassets/455155903b77409ab6b5a617acf249c4/091422-9.png?width=338&height=304&rmode=Max&bgcolor=transparent)
Malware analysis
LockBit 3.0 ransomware analysis
Hospitals and health systems are susceptible to the LockBit ransomware.
![](/contentassets/2038f10b5d354ac78ebe8faaae1f19c1/090722-3.png?width=338&height=304&rmode=Max&bgcolor=transparent)
Malware analysis
AstraLocker releases the ransomware decryptors
Astralocker is a piece of ransomware first identified in 2021. It is probably a fork from the well-known Babuk and other ransomware like Rook. Version 2.0 of
![](/contentassets/51a9d68a9f344ec0821055d587471208/083122-10.png?width=338&height=304&rmode=Max&bgcolor=transparent)
Malware analysis
Analysis of Nokoyawa ransomware
Ransomware is an ongoing threat. New variants are constantly detected, and existing threats keep adding new features and techniques for performing malicious
![](/contentassets/39fb543ef8bc4d89842a19f781dd5c0a/082922-11.png?width=338&height=304&rmode=Max&bgcolor=transparent)
Malware analysis
Goodwill ransomware group is propagating unusual demands to get the decryption key
Goodwill ransomware uses three different socially-driven and philanthropic activities to be able to download the decryption key.
![](/contentassets/b8498a27226545878c2222965cff86f3/082422-2.png?width=338&height=304&rmode=Max&bgcolor=transparent)
Malware analysis
Dangerous IoT EnemyBot botnet is now attacking other targets
EnemyBot is a dangerous IoT botnet that was designed to attack web servers, Android devices and CMS servers. Learn more in this article.
![](/contentassets/195549e6a76d4aefbbd16015239463e5/080322-3.png?width=338&height=304&rmode=Max&bgcolor=transparent)
Malware analysis
Fileless malware uses event logger to hide malware
Learn about a fileless malware that is “taking advantage of Windows event logs to stash chunks of shellcode for the first time in the wild.”