Welcome to the VirusTotalresearch report. We hope that by sharing our visibility into the threat landscape we can help researchers, security practitioners, and the public better...
Category: MalWare
Cheat Sheet Papers CISO2CISO Notepad Series Cyber Posters MalWare Technical Documents TOP Featured Post User most voted post
Malware Analysis TIPS & TRICKS Poster by SANS DFIR
Uncovering the capabilities of malicious software allows security professionals to respond to incidents, fortify defenses, and derive threat intelligence. The malware analysis tips and tricks outlined...
A Deep Dive into Black Basta Ransomware by SecurityScorecard
Executive summaryBlack Basta ransomware is a recent threat that compiled its first malware samples in February The ransomware deletes all Volume Shadow Copies, creates a new...
Modern Malware for Dummies
IntroductionModern malware has transformed into highly sophisticated network applications and has, in the process,changed the world of enterprise security and how networks are attacked. These threats...
The 116 Best Cybersecurity Tools & Tactics 2021
If you want the best cybersecurity tools and tactics all in one place, you will love this guide.Below are the best 116 tools and tactics to...
Fireside chat: New ‘SASE’ weapon chokes off ransomware before attack spreads laterally
Fireside chat: New ‘SASE’ weapon chokes off ransomware before attack spreads laterallyIt’s stunning that the ransomware plague persists. Related: ‘SASE’ blends connectivity and security Verizon’s Data...
Article 5? It’s complicated. Influence ops for economic advantage. SOHO routers under attack. YTStealer described. RansomHouse hits AMD. A NetWalker affiliate cops a plea.
NATO’s response to Killnet’s cyberattacks on Lithuania. Influence operations in the interest of national market share. SOHO routers are under attack. YTStealer is out and active...
281: Debug ransomware and win $1,000,000, period-tracking apps, and AI gets emotional
A new version of the LockBit ransomware offers a bug bounty, women uninstall period-tracking apps in fear of how their data might be used against them,...
bleepingcomputer – LockBit 3.0 introduces the first ransomware bug bounty program
The LockBit ransomware operation has released ‘LockBit 3.0,’ introducing the first ransomware bug bounty program and leaking new extortion tactics and Zcash cryptocurrency payment options. The...
thehackernews – Researchers Uncover New Android Spyware With C2 Server Linked to Turla Hackers
The Hacker News An Android spyware application has been spotted masquerading as a “Process Manager” service to stealthily siphon sensitive information stored in the infected devices....