Blog
macOS Payloads | 7 Prevalent and Emerging Obfuscation Techniques
Read Now
The Good, the Bad and the Ugly in Cybersecurity – Week 4
Read Now
12 Months of Fighting Cybercrime & Defending Enterprises | SentinelLabs 2022 Review
Read Now
MITRE Managed Services Evaluation | 4 Key Takeaways for MDR & DFIR Buyers
Read Now
Back to Search Results
macOS Payloads | 7 Prevalent and Emerging Obfuscation Techniques
Read Now
The Good, the Bad and the Ugly in Cybersecurity – Week 4
Read Now
12 Months of Fighting Cybercrime & Defending Enterprises | SentinelLabs 2022 Review
Read Now
MITRE Managed Services Evaluation | 4 Key Takeaways for MDR & DFIR Buyers
Read Now
22 Cybersecurity Twitter Accounts You Should Follow in 2022
Read Now
From the Front Lines | Unsigned macOS oRAT Malware Gambles For The Win
Read Now
The Good, the Bad and the Ugly in Cybersecurity – Week 12
Read Now
The Good, the Bad and the Ugly in Cybersecurity – Week 10
Read Now
12 Months of Fighting Cybercrime & Defending Enterprises | SentinelLabs 2021 Review
Read Now
The Good, the Bad and the Ugly in Cybersecurity – Week 45
Read Now
Podcast: “Roided-out Sitting Duck, Part 1” with Juan Andres Guerrero-Saade
Read Now
Peeking into CVE-2021-40444 | MS Office Zero-Day Vulnerability Exploited in the Wild
Read Now
Top 50 Subreddits for Cybersecurity and Infosec
Read Now
Hack Chat | Meet Pedram Amini: Master at Fuzzing and Bootstrapping Companies
Read Now
Why Your macOS EDR Solution Shouldn’t Be Running Under Rosetta 2
Read Now
Stopping SolarWinds Breach with Jared Phipps
Read Now
Inside the Mind of the SUNBURST Adversary
Read Now
Top 10 Telegram Cybersecurity Groups You Should Join
Read Now
21 Cybersecurity Twitter Accounts You Should Be Following in 2021
Read Now
12 Months of Fighting Cybercrime | SentinelLabs 2020 Review
Read Now
How to Detect FinFisher Spyware on macOS
Read Now
Defending macOS Against Sophisticated Attacks
Read Now
Going Kextless | Why We All Need to Transition Away from Kernel Extensions
Read Now
Hackers on Macs: Must-Have Apps & Tools
Read Now
Darknet Diaries | MS08-067 | What Happens When Microsoft Discovers a Major Vulnerability within Windows
Read Now
The Good, the Bad and the Ugly in Cybersecurity – Week 12
Read Now
How To Bypass XProtect on macOS Catalina
Read Now
Can Your Mac Get A Virus? Let’s Talk Facts
Read Now
Scripting Macs With Malice | How Shlayer and Other Malware Installers Infect macOS
Read Now
The Death of Network Perimeter Security
Read Now
MacOS Malware Outbreaks 2019 | The Second 6 Months
Read Now
macOS Red Team: Calling Apple APIs Without Building Binaries
Read Now
How MedusaLocker Ransomware Aggressively Targets Remote Hosts
Read Now
Going Deep | A Guide to Reversing Smoke Loader Malware
Read Now
Stop the Churn, Avoid Burnout | How To Keep Your Cybersecurity Personnel
Read Now
From “RobbinHood” to APT28: Crimeware Virus & APT Journey
Read Now
Checkm8: 5 Things You Should Know About The New iOS Boot ROM Exploit
Read Now
Malicious Input: How Hackers Use Shellcode
Read Now
7 Ways Hackers Steal Your Passwords
Read Now
11 Things You Didn’t Know About Black Hat USA 2019
Read Now
13 Best Practices to Prevent Ecommerce Security Threats
Read Now
How To Get Started In Cybersecurity
Read Now
21 macOS and iOS Twitter Accounts You Should Be Following
Read Now
21 Cyber Security Twitter Accounts You Should Be Following
Read Now
How to Reverse Malware on macOS Without Getting Infected | Part 3
Read Now
How to Reverse Malware on macOS Without Getting Infected | Part 2
Read Now
How to Reverse Malware on macOS Without Getting Infected | Part 1
Read Now
Apple Malware: Uncovering the Mysterious Removal (MRT) Tool Update
Read Now
On the Trail of OSX.FairyTale | Adware Playing at Malware
Read Now
OSX.Fruitfly recycled | macOS still vulnerable to ‘old’ Perl script
Read Now
Malware Identification for Android | Caleb Fenton Talks to Cyber Defenders
Read Now
Work in Progress
Read Now
The Weakest Link: When Admins Get Phished | MacOS “OSX.Dummy” Malware
Read Now
Deception and Counterintelligence
Read Now
Deep Hooks: Monitoring native execution in WoW64 applications – Part 3
Read Now
DevOps: Past, Present, and Future
Read Now
CS:GO Hacks for Mac That You Shouldn’t Trust
Read Now
Measuring the Usefulness of Multiple Models
Read Now
Little Snitch: What It Is and How It’s Implemented
Read Now
Apple EFI firmware passwords and the SCBO myth
Read Now
Latest Malware Threat Stealthily Flees from Security Products
Read Now
SentinelOne Discovers a New Delivery Tactic for BlackEnergy 3
Read Now
Reversing Apple’s syslogd bug
Read Now
Vulnerability in Blackphone Puts Devices at Risk for Takeover
Read Now
Gh0st RAT: What Is It and How do You Find It?
Read Now
Breaking and evading Linux with a new novel technique
Read Now
Invisible, Government-authored Malware Makes its Way to Underground Forums
Read Now
The Anatomy of CryptoWall 3.0 Virus
Read Now
The case of the Gyges, the invisible Malware
Read Now
A Systematic Look at EC2 I/O
Read Now
Labs
DragonSpark | Attacks Evade Detection with SparkRAT and Golang Source Code Interpretation
Read Now
LABScon Replay | Blasting Event-Driven Cornucopia: WMI-based User-Space Attacks Blind SIEMs and EDRs
Read Now
LABScon Replay | Breaking Firmware Trust From The Other Side: Exploiting Early Boot Phases (Pre-Efi)
Read Now
11 Problems ChatGPT Can Solve For Reverse Engineers and Malware Analysts
Read Now
Back to Search Results
DragonSpark | Attacks Evade Detection with SparkRAT and Golang Source Code Interpretation
Read Now
LABScon Replay | Blasting Event-Driven Cornucopia: WMI-based User-Space Attacks Blind SIEMs and EDRs
Read Now
LABScon Replay | Breaking Firmware Trust From The Other Side: Exploiting Early Boot Phases (Pre-Efi)
Read Now
11 Problems ChatGPT Can Solve For Reverse Engineers and Malware Analysts
Read Now
Driving Through Defenses | Targeted Attacks Leverage Signed Malicious Microsoft Drivers
Read Now
LABScon Replay | The Mystery of Metador
Read Now
Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection
Read Now
Inside the Black Box | How We Fuzzed Microsoft Defender for IoT and Found Multiple Vulnerabilities
Read Now
The Art and Science of macOS Malware Hunting with radare2 | Leveraging Xrefs, YARA and Zignatures
Read Now
Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP Firmware
Read Now
Zen and the Art of SMM Bug Hunting | Finding, Mitigating and Detecting UEFI Vulnerabilities
Read Now
AlphaGolang | A Step-by-Step Go Malware Reversing Methodology for IDA Pro
Read Now
Techniques for String Decryption in macOS Malware with Radare2
Read Now
6 Pro Tricks for Rapid macOS Malware Triage with Radare2
Read Now
Hive Attacks | Analysis of the Human-Operated Ransomware Targeting Healthcare
Read Now
A Deep Dive into Zebrocy’s Dropper Docs
Read Now
Adventures From UEFI Land: the Hunt For the S3 Boot Script
Read Now
Top 15 Essential Malware Analysis Tools
Read Now
A Guide to Ghidra Scripting Development for Malware Researchers
Read Now
Building a Custom Malware Analysis Lab Environment
Read Now
Moving From Dynamic Emulation of UEFI Modules To Coverage-Guided Fuzzing of UEFI Firmware
Read Now
Moving From Manual Reverse Engineering of UEFI Modules To Dynamic Emulation of UEFI Firmware
Read Now
Moving From Common-Sense Knowledge About UEFI To Actually Dumping UEFI Firmware
Read Now
Enter the Maze: Demystifying an Affiliate Involved in Maze (SNOW)
Read Now
Writing Malware Traffic Decrypters for ISFB/Ursnif
Read Now
Info Stealers | How Malware Hacks Private User Data
Read Now
RIG Exploit Kit Chain Internals
Read Now
Gootkit Banking Trojan | Part 2: Persistence & Other Capabilities
Read Now
macOS Incident Response | Part 2: User Data, Activity and Behavior
Read Now
Press