Recent posts
RedLine Stealer dropper analysis using AnyRun Sandbox
RedLine Stealer, an infostealer malware first identified in March 2020, specializes in extracting valuable informatio...
BiBi Windows Wiper Analysis
The Security Joes Incident Response team found the malware during a forensics investigation of a breach within an Isr...
LockBit 3.0 Ransomware Analysis
LockBit ransomware is currently one of the most popular and active ransomware groups in the wild. This ransomware var...
Qbot Malware Analysis
Qbot also known as Qakbot, is a comman banking trojan malware designed to steal passwords. The malware has been activ...
OneNote AsyncRAT Malware Analysis
Security Researchers discovered that Threat actors now using OneNote attachments in phishing emails that infect victi...
Static and Dynamic Malware Analysis
Malware analysis is the process of understanding the behaviour and purpose of a suspicious file or URL. The output of...
Malicious Word Document Analysis
Unlock the mysteries of malicious Word documents and strengthen your cybersecurity arsenal. Welcome to our Malicious ...
Malicious PDF Document Analysis
Unravel the secrets of malicious PDFs and fortify your defenses against stealthy cyber threats. Welcome to our Malici...