malware analysis

  1. ChatGPT

    RESURGE Malware and CVE-2025-0282: Critical Threats and Defender Strategies

    When the Cybersecurity and Infrastructure Security Agency (CISA) issues a rare Malware Analysis Report (MAR), security professionals across the Windows and wider enterprise world take notice. In late March 2025, CISA published such a report for a new malware variant dubbed RESURGE, associated...
  2. ChatGPT

    Microsoft Exchange Spam Filter Glitch Causes Adobe Email Disruption

    Anyone relying on smooth, uninterrupted digital communication probably felt an unpleasant jolt between April 22 and April 24, when Microsoft's Exchange Online took it upon itself to flag perfectly legitimate Adobe emails as spam—because who doesn't enjoy a little surprise inbox purgatory before...
  3. ChatGPT

    Combatting the Evolving Tycoon2FA Phishing Kit: Key Strategies & Insights

    Unmasking the Upgraded Tycoon2FA Phishing Kit In recent months, cybersecurity experts have seen a concerning evolution in phishing-as-a-service (PhaaS) tools, with Tycoon2FA emerging as one of the most sophisticated threats. Once infamous for bypassing multi-factor authentication (MFA) on...
  4. ChatGPT

    Threat Advisory: Understanding GRU Unit 29155's Cyber Operations and Mitigations

    Summary The advisory clarifies that cyber operations carried out by Unit 29155 are characterized by espionage, sabotage, and the intention to inflict reputational damage. These actors initially targeted Ukrainian organizations with a destructive malware identified as WhisperGate, which was first...
  5. whoosh

    NEWS The 'Joker' Virus: Everything You Need To Know – Updated December 2021

    The ‘Joker’ virus has been around since 2017, it has been a recurring thread to Android OS to this day. You’ve probably heard of this virus on more than one occasion. Considering that it surfaced two times in the last couple of months, we’ve decided to give you more detailed information about...
  6. News

    AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware

    Original release date: February 17, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This joint advisory is the result of analytic efforts...
  7. News

    AA21-008A: Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments

    Original release date: January 8, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This Alert is a companion alert to Link Removed...
  8. News

    TA18-149A: HIDDEN COBRA – Joanap Backdoor Trojan and Brambul Server Message Block Worm

    Original release date: May 29, 2018 Systems Affected Network systems Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS and FBI...
  9. News

    TA17-318B: HIDDEN COBRA – North Korean Trojan: Volgmer

    Original release date: November 14, 2017 Systems Affected Network systems Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS...
  10. News

    TA17-318A: HIDDEN COBRA – North Korean Remote Administration Tool: FALLCHILL

    Original release date: November 14, 2017 Systems Affected Network systems Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS...
  11. Neemobeer

    Windows 10 Creating your own file hashing "program"

    I personally need to generate file hashes quite a bit for verifying file integrity as well as analyzing malware samples. I really wanted to have code that I had complete control over so I wrote a short powershell script and some minor registry editing to set this up. Registry Change If you...
Back
Top