Recent posts

RedLine Stealer dropper analysis using AnyRun Sandbox

RedLine Stealer, an infostealer malware first identified in March 2020, specializes in extracting valuable informatio...

3 minute read

BiBi Windows Wiper Analysis

The Security Joes Incident Response team found the malware during a forensics investigation of a breach within an Isr...

5 minute read

LockBit 3.0 Ransomware Analysis

LockBit ransomware is currently one of the most popular and active ransomware groups in the wild. This ransomware var...

8 minute read

Qbot Malware Analysis

Qbot also known as Qakbot, is a comman banking trojan malware designed to steal passwords. The malware has been activ...

2 minute read

OneNote AsyncRAT Malware Analysis

Security Researchers discovered that Threat actors now using OneNote attachments in phishing emails that infect victi...

3 minute read

Static and Dynamic Malware Analysis

Malware analysis is the process of understanding the behaviour and purpose of a suspicious file or URL. The output of...

5 minute read

Malicious Word Document Analysis

Unlock the mysteries of malicious Word documents and strengthen your cybersecurity arsenal. Welcome to our Malicious ...

11 minute read

Malicious PDF Document Analysis

Unravel the secrets of malicious PDFs and fortify your defenses against stealthy cyber threats. Welcome to our Malici...

4 minute read