Emotet: The Story of Disposable C2 Servers

Emotet: The Story of Disposable C2 Servers

With Emotet remaining in the spotlight, we continue investigating its evolution. See how quick bursts of C2 availability help bypass mitigation tactics ... Read More
Ursnif Malware - A Polymorphic Delivery Mechanism Explained

Ursnif – A Polymorphic Delivery Mechanism Explained

How can malware rapidly change itself within seconds from one download to another? Read on to discover how Ursnif delivers custom malicious payloads ... Read More
image of oletools

Trickbot | Technical Analysis of a Banking Trojan Malware

Trickbot malware continues to evolve. We take a deep-dive into how Trickbot works from initial infection to final payloads. Want to see how it works? ... Read More
Image of Phishing email not known to VT

Return to Sender: A Technical Analysis of A Paypal Phishing Scam

| | Security Research
What lies behind the click of a phishing scam? If you've ever wondered how you could lose your Paypal credentials from an email, read how it works here ... Read More