Результаты поиска
  1. 5 часов назад

    Practical Analysis Essentials for Incident Responders by with a demo of

  2. 6 часов назад

    2nd Florida city in just one week to pay hackers over $400,000 for computer systems seized in ransomware attack , via

  3. 8 часов назад

    [possibly developed by the bank insiders] cashing out ATMs? Meet

  4. 13 часов назад

    Obfuscating Backdoors Using Legitimate Code Wrappers * Quttera web security blog

  5. 17 часов назад

    Authorities in Bangladesh are investigating hacker attacks against at least three banks in that nation last month. Similar to Cosmos Case.

  6. 18 часов назад

    John Snow, King of the North, is trespassing with base64! Not returning to Winterfell afterward, instead heading to hxxp://vemvemserver.duckdns.org:1425 (). Passes info through user-agent as well With 0 detection (VT 0/56)

  7. 19 часов назад
  8. 26 июн.
  9. 26 июн.

    today I received a email with a html file attached. normally not that interesting but this one caught my attention. it turned out to be in the end. made a visualization of the infection stages..

  10. 25 июн.
  11. 25 июн.

    I’m one of the lucky students that gets to to attend the Malware & Reverse Engineering conference next week!! Super excited! Thanks so much

  12. 24 июн.
    Показать эту ветку
  13. 24 июн.
  14. 22 июн.

    A (not recent but) fundamental Tutorial about Windows Executable

  15. 22 июн.

    Reverse Engineering Malware, Part 3: Getting Started with IDA Pro

  16. 22 июн.
  17. 22 июн.

    2019-06-21: Backdoor 👾 | Signed Dig Cert 🔏-> [SEC PARTNERS LIMITED] 🏦 "LAUNCHER" in Resource (RCData) 🗜️-> LOADER "module32|64.dll"🔩 Anti-VM | Registry Install ⏲️ | C2 obuhov2k.beget[.]tech h/t MD5: 40d2986687f7d6004dc455336c645030

  18. 21 июн.

    upload from & 9456197d0f8b6cabfea5f02ffb0176dd (Kuwait) 5924eac8af1f3e3f1f825998bc59c062 (Brazil) String: 'T$(D1\$$D1\$(D1\$,D1\$0D1\$4D1\$8D1\$<D1\$@D1\$DH'

  19. 21 июн.

    Living-off-the-land (LotL) part 2 blog is available. Taking a look at real examples from malware I see day to day. Thank you for making it easy to search for ATT&CK techniques.

  20. 21 июн.

    This is interesting ➤ Here's a new that first launches Virtual Machine (VM) on Windows and systems, and then automatically starts mining software within it... just to take the best of your CPU resources Read more: —by

Загрузка может занять некоторое время.

Вероятно, серверы Твиттера перегружены или в их работе произошел кратковременный сбой. Повторите попытку или посетите страницу Статус Твиттера, чтобы узнать более подробную информацию.