Malware analysis

Malware analysis
How AsyncRAT is escaping security defenses
Learn more about the popular and dangerous AsyncRAT malware.

Malware analysis
Chrome extensions used to steal users' secrets
Learn how Chrome extensions are being used for nefarious purposes.

Malware analysis
Luna ransomware encrypts Windows, Linux and ESXi systems
Criminals use the Rust and Goland programming languages to develop new threats.

Malware analysis
Bahamut Android malware and its new features
Learn all about the Bahamut malware that is once again infecting devices.

Malware analysis
LockBit 3.0 ransomware analysis
Hospitals and health systems are susceptible to the LockBit ransomware.

Malware analysis
AstraLocker releases the ransomware decryptors
Astralocker is a piece of ransomware first identified in 2021. It is probably a fork from the well-known Babuk and other ransomware like Rook. Version 2.0 of

Malware analysis
Analysis of Nokoyawa ransomware
Ransomware is an ongoing threat. New variants are constantly detected, and existing threats keep adding new features and techniques for performing malicious

Malware analysis
Goodwill ransomware group is propagating unusual demands to get the decryption key
Goodwill ransomware uses three different socially-driven and philanthropic activities to be able to download the decryption key.

Malware analysis
Dangerous IoT EnemyBot botnet is now attacking other targets
EnemyBot is a dangerous IoT botnet that was designed to attack web servers, Android devices and CMS servers. Learn more in this article.

Malware analysis
Fileless malware uses event logger to hide malware
Learn about a fileless malware that is “taking advantage of Windows event logs to stash chunks of shellcode for the first time in the wild.”