Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Everywhere
Threads
This forum
Search titles only
By:
Everywhere
Threads
This forum
Search titles only
By:
Malware Analysis
Discussions for the current threat landscape and malicious code analysis. No direct links to malware or samples. Not suitable for
Malware Removal
.
Post thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Search by Label
All threads
By Staff
Question
Reverse Engineering
Malware Analysis
Social Engineering
Scam
Ransomware
Cybercrime
Sub Forum
Malware Analysis Archive
Malware Analysis
Capcut fake stealer
Jul 19, 2023
silversurfer
Prev
1
2
3
4
5
…
Go to page
Go
16
Next
First
Prev
3 of 16
Go to page
Go
Next
Last
Sort by:
Replies
Ascending
Filters
Show only:
Loading…
Title
(No prefix)
(No prefix)
Question
Reverse Engineering
Malware Analysis
Social Engineering
Scam
Ransomware
Cybercrime
(No prefix)
Question
Reverse Engineering
Malware Analysis
Social Engineering
Scam
Ransomware
Cybercrime
Social Engineering
How social media platforms mine personal data for profit
Stopspying
Apr 5, 2020
Replies
0
Views
1,202
Apr 5, 2020
Stopspying
Cybercrime
The Cyber Defense Index 2022/23
vtqhtr413
Dec 30, 2022
Replies
0
Views
704
Dec 30, 2022
vtqhtr413
A
com surrogate high cpu usage
Arman_2020
Apr 29, 2020
Replies
0
Views
1,354
Apr 29, 2020
Arman_2020
A
Malware Analysis
Salfram : Robbing the Place Without Removing Your Name Tag
upnorth
Sep 4, 2020
Replies
0
Views
1,517
Sep 4, 2020
upnorth
Wireshark - Malware traffic Analysis - Collecting IOCs
HackExplorer
Sep 20, 2019
Replies
0
Views
1,202
Sep 20, 2019
HackExplorer
Malware Analysis
From a small BAT file to Mass Logger infostealer
Zed00
Jan 6, 2021
Replies
0
Views
1,099
Jan 6, 2021
Zed00
Scam
Instagram scammers targeting mountain bikers
mtbboy1993
Nov 14, 2021
Replies
0
Views
1,178
Nov 14, 2021
mtbboy1993
F
Advice Request
Malware analysis methodologies
FalconBrave
Dec 25, 2019
Replies
0
Views
1,054
Dec 25, 2019
FalconBrave
F
Malware Analysis
signs of Advanced persistent Threats
DDE_Server
Dec 26, 2019
Replies
0
Views
2,000
Dec 26, 2019
DDE_Server
Malware Analysis
Video: .NETReactor deobfuscation and configuration extraction of AgentTesla
struppigel
Nov 12, 2023
Replies
0
Views
716
Nov 12, 2023
struppigel
Advice Request
How cybercriminals victimize WoW players
Bot
Aug 17, 2020
Replies
0
Views
1,990
Aug 17, 2020
Bot
Threat Hunting with VT – Black Belt Edition
Andy Ful
Sep 29, 2021
Replies
0
Views
742
Sep 29, 2021
Andy Ful
Malware Analysis
[Video] Unpacking payload from AutoIt-based stub
struppigel
Jan 27, 2024
Replies
0
Views
325
Jan 27, 2024
struppigel
Poll
Ransomware
New version of Hidden Tear (Death Hidden Tear) April 2020
cybercrucible
Apr 15, 2020
Replies
0
Views
2,213
Apr 15, 2020
cybercrucible
Ransomware
Stopping the Explosion of Ransomware
upnorth
Dec 10, 2017
Replies
0
Views
1,326
Dec 10, 2017
upnorth
Advice Request
STOP/DJVU Who made this and what is the purpose of the ransomware?
JamieTechAV
Apr 18, 2022
Replies
0
Views
652
Apr 18, 2022
JamieTechAV
Cybercrime
Hack-for-Hire Groups Present a Potent Threat
upnorth
Jul 1, 2022
Replies
0
Views
775
Jul 1, 2022
upnorth
PhantomLance Android backdoor discovered on Google Play
Bot
Apr 30, 2020
Replies
0
Views
1,540
Apr 30, 2020
Bot
Malware Analysis
sLoad launches version 2.0, Starslord
Bot
Jan 21, 2020
Replies
0
Views
1,377
Jan 21, 2020
Bot
Ransomware
The Untold Story of a Crippling Ransomware Attack
vtqhtr413
Jan 30, 2023
Replies
0
Views
400
Jan 30, 2023
vtqhtr413
Prev
1
2
3
4
5
…
Go to page
Go
16
Next
First
Prev
3 of 16
Go to page
Go
Next
Last
Top