Virtual Machine Platforms
Sandbox & Automation
August 6, 2014
Spammers are good when it comes to intimidating users to open the attachment . One of the recent pathetic and cruel one was
A Person from your office was found dead outside . Please open the picture to see if you know him .
Attachment is basically a Zip file c...
TeslaCrypt 2.0: Cyber Crime Malware Behavior, Capabilities and Communications
September 24, 2015
TorrentLocker Actors Fix Encryption Flaw
November 2, 2014
iSIGHT Partners Reveals Operation SMN, Tailgater Team and Axiom Group
October 28, 2014
iSIGHT Partners Discovers 0-Day Being Used by Sandworm Team
October 14, 2014
Analysis of ‘TorrentLocker’ – A New Strain of Ransomware Using Components of CryptoLocker and CryptoWall
August 15, 2014
How to bypass Zeus Trojan’s self protection mechanism ~ by Raashid Bhat
How to Become a Certified Malware Analysis Expert
October 13, 2013
INTRODUCTION: Cyber Security, a term more commonly used in today’s ever-present battle to defend companies, governments, and personal computer netwo...