Tracking Atomic Stealer on macOS: Sophisticated Malware Replacing LedgerLive App Post date August 24, 2024 Post author By Moonlock (by MacPaw) Post categories In cryptowallet, cyber-threats, good-company, infection-chain, ledgerlive, macos, malware, malware-analysis
YARA Rules in a Nutshell Post date June 18, 2021 Post author By Jessica Truong Post categories In blogging-fellowship, cybersecurity, cybersecurity-tools, hackernoon-top-story, malware-analysis, reverse-engineering, security, yara-rules
Advanced Heuristics to Detect Zero-Day Attacks Post date March 28, 2021 Post author By Ensar Seker Post categories In cyber-attack, cyber-security, cybersecurity, heuristics-detection, malware-analysis, malware-protection, zero-day-attacks, zero-day-exploits
Lessons Learned From SolarWinds: Defensive Strategy Against Novel Malware Post date February 10, 2021 Post author By Rajesh Khazanchi Post categories In cyber-security, cyber-threats, cybersecurity, malware, malware-analysis, malware-threat, remote-access-trojan, zero-trust