Malware analysis

HermeticWiper malware used against Ukraine

Learn the technical details of the HermeticWiper malware being used against Ukraine.

MyloBot 2022: A botnet that only sends extortion emails

Learn how the MyloBot threat works, its internal capabilities and measures to combat malware.

Mars Stealer malware analysis

Learn how mars stealer malware works, its tactics, techniques and procedures.

How to remove ransomware: Best free decryption tools and resources

Learn details on removing ransomware, the various ransomware examples that have affected both individuals and big organizations, and more.

Purple Fox rootkit and how it has been disseminated in the wild

Analyze how Purple Fox works malware victims are impacted and how to avoid this threat

Deadbolt ransomware: The real weapon against IoT devices

Learn about the key points of the Deadbolt ransomware, how it operates and how to recover the damaged files without paying the ransom.

Log4j - the remote code execution vulnerability that stopped the world

Learn how the log4j flaw works, how adversaries can take advantage of this weakness and provide the main steps to fix it.

Rook ransomware analysis

In this article, we will go through the details of rook, describe the most effective techniques, and provide some measures to fight ransomware.

Modus operandi of BlackByte ransomware

Learn about BlackByte, a data encryption malware targeting various organizations.

Emotet malware returns

Learn about the main features introduced by criminals into this new Emotet release, how it is being disseminated and practical measures to avoid malware in general.