Reverse Engineering, Binary Analysis, Behavior Study, Detection Evasion
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
zimperium.com·22h
MT4DP: Data Poisoning Attack Detection for DL-based Code Search Models via Metamorphic Testing
arxiv.org·7h
Android Malware Konfety evolves with ZIP manipulation and dynamic loading
securityaffairs.com·18h
AsyncRAT Spawns Concerning Labyrinth of Forks
darkreading.com·15h
Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation
darknet.org.uk·10h
Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication
unit42.paloaltonetworks.com·2d
W1seGuy | TryHackMe Walkthrough — XOR? BrUt3_F0rC3 iT
infosecwriteups.com·2d
Amazon warns 200 million Prime customers that scammers are after their login info
malwarebytes.com·48m
Unsupervised Learning NO. 489
newsletter.danielmiessler.com·1d
Checking data integrity
eclecticlight.co·5h
A defender’s guide to initial access techniques
redcanary.com·1d
Towards Generic Ransomware Detection
objective-see.com·1d
Loading...Loading more...