Reverse Engineering, Binary Analysis, Behavior Study, Detection Evasion
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
zimperium.com·13h
Android Malware Konfety evolves with ZIP manipulation and dynamic loading
securityaffairs.com·8h
AsyncRAT Spawns Concerning Labyrinth of Forks
darkreading.com·6h
Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication
unit42.paloaltonetworks.com·1d
W1seGuy | TryHackMe Walkthrough — XOR? BrUt3_F0rC3 iT
infosecwriteups.com·1d
Unsupervised Learning NO. 489
newsletter.danielmiessler.com·1d
A defender’s guide to initial access techniques
redcanary.com·1d
Towards Generic Ransomware Detection
objective-see.com·1d
Week 28 – 2025
thisweekin4n6.com·2d
AI Shield: How Artificial Intelligence Protects Your Digital Life
blog.checkpoint.com·1d
The Cybersecurity Challenges Behind Your Feed
cyberthreatalliance.org·1d
Loading...Loading more...