Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering
research.checkpoint.com·17h
🔬Reverse Engineering
Flag this post
3,000+ YouTube videos deliver malware disguised as free software
foxnews.com·9h
🔐Cybersecurity
Flag this post
Cracking XLoader with AI: How Generative Models Accelerate Malware Analysis
blog.checkpoint.com·19h
🔬Reverse Engineering
Flag this post
Analysis Playbooks: USB
🔬Reverse Engineering
Flag this post
ShadowLogic: Backdoors in Any Whitebox LLM
arxiv.org·2h
🔐Cybersecurity
Flag this post
How Transformer Models Detect Anomalies in System Logs
hackernoon.com·13h
🦈Wireshark
Flag this post
Growing VPN Exploits Trigger Fresh Ransomware Crisis in APAC
blogger.com·1d
🔐Cybersecurity
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·3d
🎯Penetration Testing
Flag this post
Android Malware Mutes Alerts, Drains Crypto Wallets
darkreading.com·9h
🔐Cybersecurity
Flag this post
Reverse Engineering Googles BotGuard
🔬Reverse Engineering
Flag this post
The Noise and the Signal
🦈Wireshark
Flag this post
Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks
thehackernews.com·18h
🎯Penetration Testing
Flag this post
Analysis of NGate malware campaign (NFC relay)
cert.pl·21h
🔒TLS/SSL
Flag this post
Dive into Systems
💻Computer Science
Flag this post
A Hacker’s Journey to NASA’s Hall of Fame
infosecwriteups.com·22h
🎯Penetration Testing
Flag this post
Wavelet-Based Feature Extraction and Unsupervised Clustering for Parity Detection: A Feature Engineering Perspective
arxiv.org·2h
🔐Cryptography
Flag this post
Chaotic-AUR is trying to fight Arch Linux malware
howtogeek.com·15h
🐧Linux
Flag this post
Loading...Loading more...