Efficient analysis of new executable samples is extremely important when sharing information on evolving threats

How to Analyze Malware for Technical Writing

In the ever-changing world of cybersecurity, new threats appear and evolve on a regular basis. To efficiently conduct an analysis and publish new findings on emerging malware, it’s important to be prepared. We share tips on how researchers can conduct the analysis, and a suggested workflow. The post How to ... Read More
placeholder-1400x933px

Colonial Pipeline Ransomware Attack: Revealing How DarkSide Works

The Colonial Pipeline ransomware attack is one of the most notable critical infrastructure breaches of recent years. Learn the encryption, anti-detection and other techniques used by DarkSide’s main executable so you can evaluate your own defenses. Includes IoCs and a decryption script for detection. The post Colonial Pipeline Ransomware Attack: ... Read More