The cybersecurity community has recently been alerted to a sophisticated attack method known as "MalDoc in PDF," which involves embedding…
RunAs-Stealer is a sophisticated credential stealing tool that employs three distinct techniques to capture sensitive user information: Hooking CreateProcessWithLogonW, Smart…
BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and Endpoint Detection and Response (EDR)…
NailaoLoader employs sophisticated techniques to obscure its execution flow, leveraging Windows Management Instrumentation (WMI) for lateral movement and file transfer.…
The Ransomware Tool Matrix is a valuable repository designed to catalog tools commonly used by ransomware gangs and extortionist groups.…
The recent leak of Black Basta’s internal communications, spanning over 200,000 chat messages, has provided an unprecedented look into the…
LummaC2 is a commodity malware designed as an information stealer, targeting browsers, cryptocurrency wallets, and authentication data. Marketed as a…
YaraHunter, developed by Deepfence, is a versatile malware scanner designed for cloud-native environments. It leverages YARA rulesets to detect indicators…
Stuxnet, a groundbreaking cyberweapon first discovered in 2010, targeted Iran's nuclear facilities, marking a significant evolution in cyber warfare. It…
WhacAMole (WAM) is a cutting-edge tool designed for in-depth memory and process analysis to detect, investigate, and document anomalies caused…