analysis

Shining a Light on DarkOxide: A Technical Analysis

CrowdStrike Intelligence tracked the DarkOxide threat activity cluster which launched attack campaigns against organizations within the Asia Pacific (APAC) semiconductor… Read More

3 years ago

Gokart – A Static Analysis Tool For Securing Go Code

GoKart is a static analysis tool for Go that finds vulnerabilities using the SSA (single static assignment) form of Go… Read More

3 years ago

A Quick Analysis of QakBot, a Decade-Old Threat

Kaspersky provided a detailed technical analysis of QakBot, a decade-old Trojan that is active since 2007. It also underlines the… Read More

3 years ago

QakBot technical analysis

Main description QakBot, also known as QBot, QuackBot and Pinkslipbot, is a banking Trojan that has existed for over a… Read More

3 years ago

Malware Analysis Online: Why You Need It Now For Your Cloud Environment

There is rarely a company today that has not at least part of their environment… Malware Analysis Online: Why You… Read More

3 years ago

Analysis of a Phishing Kit that targets Chase Bank

According to Sucuri researchers, this phishing toolkit is actually a surprisingly feature-rich product sold to other black hat attackers that… Read More

3 years ago

MobileAudit – SAST and Malware Analysis for Android Mobile APKs

Django Web application for performing Static Analysis and detecting malware in Android APKsIn each of the scans, it would have… Read More

3 years ago

RiskIQ Analysis Links EITest and Gootloader Campaigns, Once Thought to Be Disparate

EITest was first identified in 2014 and historically used large numbers of compromised WordPress sites and social engineering techniques to… Read More

3 years ago

New analysis of Diavol ransomware reinforces the link to TrickBot gang

In July, researchers from Fortinet reported that a new ransomware family, tracked as Diavol, might have been developed by Wizard… Read More

3 years ago

Analysis of Diavol Ransomware Reveals Possible Link to TrickBot Gang

The code itself is capable of prioritizing file types to encrypt based on a pre-configured list of extensions defined by… Read More

3 years ago

Solitude – a privacy analysis tool that enables anyone to conduct their own privacy investigations

Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or… Read More

3 years ago

Researchers Perform An Analysis on Chinese Malware Used Against Russian Government

Security researchers from the threat hunting and intelligence company Group-IB have revealed that in 2020, at least two espionage groups… Read More

3 years ago

ISOMorph Infection: In-Depth Analysis of a New HTML Smuggling Campaign

Menlo Security has been closely monitoring an attack we are naming ISOMorph. ISOMorph leverages HTML Smuggling to deliver malicious files… Read More

3 years ago

LuminousMoth APT: Sweeping attacks for the chosen few

APT actors are known for the frequently targeted nature of their attacks. Typically, they will handpick a set of targets… Read More

3 years ago

Bughound – Static Code Analysis Tool Based On Elasticsearch

Bughound is an open-source static code analysis tool that analyzes your code and sends the results to Elasticsearch and Kibana… Read More

3 years ago

Arrests of members of Tetrade seed groups Grandoreiro and Melcoz

Spain’s Ministry of the Interior has announced the arrest of 16 individuals connected to the Grandoreiro and Melcoz (also known… Read More

3 years ago