
AlphaGolang | A Step-by-Step Go Malware Reversing Methodology for IDA Pro
SentinelLabs sets off to dispel the myth that Go malware is hard to reverse engineer. This suite of IDApython scripts will set you well on your way
Read More
SentinelLabs sets off to dispel the myth that Go malware is hard to reverse engineer. This suite of IDApython scripts will set you well on your way
Exploring the links between Karma and other well-known malware families such as NEMTY and JSWorm, we find further IoCs and an evolving threat.
In Part 3 of our macOS reversing series, we look at three different macOS malware samples and walk you through how to decipher encrypted strings.
Agrius has continued to evolve its toolkit from wiper to ransomware operations, including a recent attack on a higher education facility.
Learn how to beat malware authors' control flow and avoid executing unwanted parts of their code to analyze macOS malware in radare2.
A high severity flaw in HP's OMEN Gaming Hub software allows any user to escalate privileges to kernel-level mode.
A new ZLoader campaign abuses Google Ads to target European banking institutions with signed MSI payloads and more than 300 domains.
EGoManiac is a threat actor willing to spy on friend and foe and entrap journalists without compunction. Read our groundbreaking research.
Learn more about reversing real-world macOS malware in this new series for intermediate to advanced analysts, starting with these r2 tips!
Hive is a double-extortion ransomware group that’s hit over 30 organizations. Read our deep-dive into the ransomware toolkit.