Labs

MacOS Incident Response   Part 1  Collecting Device File System Data 1

macOS Incident Response | Part 1: Collecting Device, File & System Data

How should you investigate an infected Mac? Has there been lateral movement, data exfiltration, system manipulation? Learn macOS incident response here.

Read More
Gootkit Banking Trojan   Deep Dive Into Anti Analysis Features 1

Gootkit Banking Trojan | Deep Dive into Anti-Analysis Features

Gootkit packs plenty of Anti-Analysis features to evade sandboxes, prevent execution in a Virtual Machine, and slow down analysis. Let’s take a dive inside!

Read More
Cybercrime   Banload  Banking Malware Implements New Techniques For Fraud 1

Cybercrime: Groups Behind “Banload” Banking Malware Implement New Techniques

Cybercriminals aren’t deterred by legacy AV. Learn how the gang behind “Banload” malware used a new kernel driver to remove popular anti-malware solutions.

Read More
Sebastian Unrau 47679 Unsplash 1

RobinHood Ransomware “CoolMaker” Functions Not So Cool

Robinhood Ransomware is attacking government institutions from Greenville to Baltimore. How does it work and how could you stop it? Find out here.

Read More
Lazarus APT Targets Mac Users With Poisoned Word Document 4 Scaled 1600x900

Lazarus APT Targets Mac Users with Poisoned Word Document

Threat actors have the know-how to develop campaigns that target your weakest link. Learn how Lazarus APT took their malware to Apple’s macOS platform.

Read More