Analysing PCAP Files in a Modern Way: Investigating AsyncRAT Infection Traffic with SELKS 27 minute read Introduction
Unmasking Hidden Threats: Using Velociraptor for Process Hollowing Analysis 22 minute read Introduction
Deobfuscating Obfuscated VBS Remcos Malware: Unveiling the Techniques and Capabilities 16 minute read History of Remcos Malware
Inside the Zoom_Invite.call Phishing Attack: Analysing Malware Distribution Methods Via Telegram C2 Bot 24 minute read Introduction