Combating COMB
Learn how to protect yourself against COMB and future...
Research & Threat Intel
2021 has barely begun and we have already witnessed what appears to be the biggest compilation of breached credentials in...
hacker image
SolarWinds aftermath continues with SolarLeaks
Research & Threat Intel
Earlier this week a website presumably owned by the actors behind the SolarWinds breach surfaced, claiming to be selling data...
hacker image
Using Qiling Framework to Unpack TA505 packed samples
Research & Threat Intel
In this blogpost, we are going to show how to unpack TA505 packed samples using the Qiling Framework emulator version...
hacker image
Playing with GuLoader Anti-VM techniques
Research & Threat Intel
GuLoader is one of the most widely used loaders to distribute malware throughout 2020. Among the malware families distributed by...
artificial-intelligence
What are AI and machine learning adding to threat...
Research & Threat Intel
As with any apparently game-changing technology, the benefits and drawbacks of artificial intelligence (AI) should be qualified by an accurate...