Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Everywhere
Threads
This forum
Search titles only
By:
Everywhere
Threads
This forum
Search titles only
By:
Malware Analysis
Discussions for the current threat landscape and malicious code analysis. No direct links to malware or samples. Not suitable for
Malware Removal
.
Post thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Search by Label
All threads
By Staff
Question
Reverse Engineering
Malware Analysis
Social Engineering
Scam
Ransomware
Cybercrime
Sub Forum
Malware Analysis Archive
Malware Analysis
Capcut fake stealer
Jul 19, 2023
silversurfer
Prev
1
…
Go to page
Go
11
12
13
14
15
16
Next
First
Prev
13 of 16
Go to page
Go
Next
Last
Sort by:
Views
Descending
Filters
Show only:
Loading…
Title
(No prefix)
(No prefix)
Question
Reverse Engineering
Malware Analysis
Social Engineering
Scam
Ransomware
Cybercrime
(No prefix)
Question
Reverse Engineering
Malware Analysis
Social Engineering
Scam
Ransomware
Cybercrime
Malware (and ransomware) - very short statistics.
Andy Ful
Sep 6, 2022
Replies
7
Views
860
Sep 7, 2022
Andy Ful
Malware Analysis
Using process creation properties to catch evasion techniques
Andy Ful
Jul 20, 2022
Replies
3
Views
858
Jul 20, 2022
Andy Ful
Cloud and Threat Report (Netscope, January 2022)
Andy Ful
Jan 12, 2022
Replies
0
Views
855
Jan 12, 2022
Andy Ful
Reverse Engineering
[Tool] AllCome Clipbanker configuration extractor
struppigel
Feb 5, 2022
Replies
0
Views
847
Feb 5, 2022
struppigel
New Update
Who Stole the NSA's Top Secret Hacking Tools?
upnorth
Dec 10, 2022
Replies
0
Views
842
Dec 10, 2022
upnorth
Malicious or just a sketchy program?
Xeno1234
Dec 31, 2023
Replies
10
Views
839
Jan 19, 2024
struppigel
Social Engineering
Spam and phishing in 2021
Andy Ful
Feb 9, 2022
Replies
0
Views
825
Feb 9, 2022
Andy Ful
Advice Request
Is this a malware or just FP?
brambedkar59
Jan 24, 2023
Replies
8
Views
820
Mar 4, 2023
Bot
Social Engineering
To Click or Not To Click? Insight from Large-Scale Phishing Study
upnorth
Jan 28, 2022
Replies
0
Views
808
Jan 28, 2022
upnorth
Malware Analysis
Possible Supply Chain on Ooma
Sandbox Breaker
Dec 1, 2023
Replies
5
Views
807
Dec 10, 2023
Sandbox Breaker
Cybercrime
How Target's Air Conditioning Let in a Cyberattack
upnorth
Jan 27, 2022
Replies
0
Views
799
Jan 27, 2022
upnorth
Social Engineering
Psychology of the phish
Andy Ful
Jan 12, 2022
Replies
1
Views
794
Jan 13, 2022
Dave Russo
Ransomware
Identifying Ransomware’s Stealthy Boot Configuration Edits
MuzzMelbourne
Apr 30, 2022
Replies
1
Views
786
May 1, 2022
DDE_Server
SMS phishing - package delivery
hellothere
Apr 7, 2024
Replies
14
Views
779
Apr 22, 2024
Practical Response
Cybercrime
Hack-for-Hire Groups Present a Potent Threat
upnorth
Jul 1, 2022
Replies
0
Views
779
Jul 1, 2022
upnorth
Malware Analysis
Manjusaka : A Chinese sibling of Sliver and Cobalt Strike
upnorth
Aug 3, 2022
Replies
0
Views
776
Aug 3, 2022
upnorth
Threat Hunting with VT – Black Belt Edition
Andy Ful
Sep 29, 2021
Replies
0
Views
742
Sep 29, 2021
Andy Ful
Malware Analysis
[Video] 3CX SmoothOperator C2 extraction
struppigel
Apr 7, 2023
Replies
1
Views
729
Apr 7, 2023
Trident
The Crooked Timber of Humanity
upnorth
Jun 2, 2018
Replies
0
Views
728
Jun 2, 2018
upnorth
Malware Analysis
Video: .NETReactor deobfuscation and configuration extraction of AgentTesla
struppigel
Nov 12, 2023
Replies
0
Views
725
Nov 12, 2023
struppigel
Prev
1
…
Go to page
Go
11
12
13
14
15
16
Next
First
Prev
13 of 16
Go to page
Go
Next
Last
Top