Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Everywhere
Threads
This forum
Search titles only
By:
Everywhere
Threads
This forum
Search titles only
By:
Malware Analysis
Discussions for the current threat landscape and malicious code analysis. No direct links to malware or samples. Not suitable for
Malware Removal
.
Post thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Search by Label
All threads
By Staff
Question
Reverse Engineering
Malware Analysis
Social Engineering
Scam
Ransomware
Cybercrime
Sub Forum
Malware Analysis Archive
Malware Analysis
Capcut fake stealer
Jul 19, 2023
silversurfer
Prev
1
2
3
4
5
…
Go to page
Go
16
Next
First
Prev
3 of 16
Go to page
Go
Next
Last
Sort by:
Views
Ascending
Filters
Show only:
Loading…
Title
(No prefix)
(No prefix)
Question
Reverse Engineering
Malware Analysis
Social Engineering
Scam
Ransomware
Cybercrime
(No prefix)
Question
Reverse Engineering
Malware Analysis
Social Engineering
Scam
Ransomware
Cybercrime
Reverse Engineering
Ghidra Setup Tips Video
struppigel
Dec 2, 2022
Replies
0
Views
682
Dec 2, 2022
struppigel
Malware Analysis
PyPI Malware Creators are starting to Employ Anti-Debug techniques
upnorth
Jan 3, 2023
Replies
0
Views
683
Jan 3, 2023
upnorth
Hot Take
Hold Software Makers Liable for Selling Insecure Tech - CISA 2023
upnorth
Mar 1, 2023
Replies
2
Views
693
Mar 2, 2023
ForgottenSeer 98186
F
Cybercrime
The Cyber Defense Index 2022/23
vtqhtr413
Dec 30, 2022
Replies
0
Views
704
Dec 30, 2022
vtqhtr413
Malware Analysis
Video: .NETReactor deobfuscation and configuration extraction of AgentTesla
struppigel
Nov 12, 2023
Replies
0
Views
716
Nov 12, 2023
struppigel
Malware Analysis
[Video] 3CX SmoothOperator C2 extraction
struppigel
Apr 7, 2023
Replies
1
Views
725
Apr 7, 2023
Trident
The Crooked Timber of Humanity
upnorth
Jun 2, 2018
Replies
0
Views
727
Jun 2, 2018
upnorth
Threat Hunting with VT – Black Belt Edition
Andy Ful
Sep 29, 2021
Replies
0
Views
742
Sep 29, 2021
Andy Ful
SMS phishing - package delivery
hellothere
Apr 7, 2024
Replies
14
Views
745
Apr 22, 2024
Practical Response
Malware Analysis
Manjusaka : A Chinese sibling of Sliver and Cobalt Strike
upnorth
Aug 3, 2022
Replies
0
Views
770
Aug 3, 2022
upnorth
Cybercrime
Hack-for-Hire Groups Present a Potent Threat
upnorth
Jul 1, 2022
Replies
0
Views
774
Jul 1, 2022
upnorth
Ransomware
Identifying Ransomware’s Stealthy Boot Configuration Edits
MuzzMelbourne
Apr 30, 2022
Replies
1
Views
784
May 1, 2022
DDE_Server
Social Engineering
Psychology of the phish
Andy Ful
Jan 12, 2022
Replies
1
Views
787
Jan 13, 2022
Dave Russo
Malware Analysis
Possible Supply Chain on Ooma
Sandbox Breaker
Dec 1, 2023
Replies
5
Views
788
Dec 10, 2023
Sandbox Breaker
Malicious or just a sketchy program?
Xeno1234
Dec 31, 2023
Replies
10
Views
797
Jan 19, 2024
struppigel
Cybercrime
How Target's Air Conditioning Let in a Cyberattack
upnorth
Jan 27, 2022
Replies
0
Views
798
Jan 27, 2022
upnorth
Social Engineering
To Click or Not To Click? Insight from Large-Scale Phishing Study
upnorth
Jan 28, 2022
Replies
0
Views
806
Jan 28, 2022
upnorth
Advice Request
Is this a malware or just FP?
brambedkar59
Jan 24, 2023
Replies
8
Views
818
Mar 4, 2023
Bot
Social Engineering
Spam and phishing in 2021
Andy Ful
Feb 9, 2022
Replies
0
Views
823
Feb 9, 2022
Andy Ful
New Update
Who Stole the NSA's Top Secret Hacking Tools?
upnorth
Dec 10, 2022
Replies
0
Views
838
Dec 10, 2022
upnorth
Prev
1
2
3
4
5
…
Go to page
Go
16
Next
First
Prev
3 of 16
Go to page
Go
Next
Last
Top