Malware analysis

Mekotio banker trojan returns with new TTP

Learn about the new features of the last release of Mekotio, how it works and some key points to protect against this malware.

Android malware BrazKing returns

Analyze the main layers of this malware how it operates, and provide some measures to stop threats of this nature.

Malware instrumentation with Frida

Learn about DBI with Frida Tools and explore some code and scripts useful during malware analysis.

Malware analysis arsenal: Top 15 tools

Here are some of the popular tools used by malware experts to defeat and reverse the most advanced and sophisticated pieces of malware

Redline stealer malware: Full analysis

In recent months, a recent piece of malware dubbed Redline has been distributed and gaining traction on Russian underground forums.

A full analysis of the BlackMatter ransomware

Learn how the BlackMatter malware works, about its presence on the dark web, and how to prevent the threat from affecting you.

A full analysis of Horus Eyes RAT

Malware and trojan bankers, in particular, are the most critical and emergent threats observed during this last decade.

REvil ransomware: Lessons learned from a major supply chain attack

The REvil ransomware has led to one of the most significant ransomware attacks in history but performed poorly.

Pingback malware: How it works and how to prevent it

Pingback malware is a new malware that uses ICMP to perform all the communications with the C2 server.

Android malware worm auto-spreads via WhatsApp messages

Malware found hidden in the Google Play store leverages WhatsApp messages to spread to other devices. Learn how it works.