Blog
The Good, the Bad and the Ugly in Cybersecurity – Week 45
Read Now
macOS Malware 2023 | A Deep Dive into Emerging Trends and Evolving Techniques
Read Now
XLoader’s Latest Trick | New macOS Variant Disguised as Signed OfficeNote App
Read Now
Day 1 of Black Hat USA 2023 | Generative AI, Automation & The Security Landscape of Tomorrow
Read Now
Labs
11 Ways to Tweak radare2 for Faster and Easier macOS Malware Analysis
Read Now
Bloated Binaries | How to Detect and Analyze Large macOS Malware Files
Read Now
Automating String Decryption and Other Reverse Engineering Tasks in radare2 With r2pipe
Read Now
Radare2 Power Ups | Delivering Faster macOS Malware Analysis With r2 Customization
Read Now
Resource Center
A Security Practitioners Guide To Reversing macOS Malware with Radare2
Read Now
Blasting Event-Driven Cornucopia: WMI-based User-Space Attacks Blind SIEMs and EDRs
Read Now
LABScon Replay | Breaking Firmware Trust From The Other Side: Exploiting Early Boot Phases (Pre-Efi)
Read Now
Webinar: Using Ghidra and IDA VirusTotal’s Plugins for Fun and Profit
Read Now
Press