hacker image
Using Qiling Framework to Unpack TA505 packed samples
Research & Threat Intel
In this blogpost, we are going to show how to unpack TA505 packed samples using the Qiling Framework emulator version...
hacker image
Playing with GuLoader Anti-VM techniques
Research & Threat Intel
GuLoader is one of the most widely used loaders to distribute malware throughout 2020. Among the malware families distributed by...
artificial-intelligence
What are AI and machine learning adding to threat...
Research & Threat Intel
As with any apparently game-changing technology, the benefits and drawbacks of artificial intelligence (AI) should be qualified by an accurate...
vulnerability prioritization
Why Threat Intelligence is Central to Effective Vulnerability Prioritization
Research & Threat Intel
Vulnerability management is a persistent feature of good cybersecurity practice; a routine hygiene to help proactively reduce organizational risk. But...
hacker image
TOP 5 ATT&CK techniques used by Threat Actors tied...
Research & Threat Intel
False flags and strong anonymity measures can be used to make attribution of cyberattacks more and more difficult.