Entries with this tag mention the discovery and describe the behavior of specific malicious programs.

Photo by Jez Timms on Unsplash

May 26, 2022

Jason Chavarría

How does this clever Linux Trojan operate?

Reportedly, the last six months have seen a 254% surge in this Linux Trojan's activity. Read this post to learn what it is and what should be done about it.

Photo by engin akyurt on Unsplash

March 10, 2022

Felipe Ruiz

Highlights since just before the Russian invasion

This blog post provides you with a timeline of some cybersecurity highlights since shortly before Russia invaded Ukraine up to this point.

Photo by Rostislav Artov on Unsplash

February 8, 2022

Felipe Ruiz

The emergence of WhisperGate as the first worrying sign

Although Russia has not invaded Ukraine so far, cyberattacks attributed to that world power have again been reported and could escalate into a cyberwar.

Photo by Clark Van Der Beken on Unsplash

December 7, 2021

Jason Chavarría

Clues in the investigation of cyberattacks

We describe the kinds of technical traces left in the phases of a cyberattack and talk about how they may help the attribution process.

Photo by Markus Spiske on Unsplash

November 24, 2021

Jason Chavarría

Emotet may be back for the crown as king of malware

Emotet reigned as the most dangerous malware before the shutdown of its servers earlier this year. Unfortunately, this month has seen its reappearance.

Photo by Markus Winkler on Unsplash

October 11, 2021

Jason Chavarría

Android devices are catching FluBot and TangleBot

Read this post to learn about two Android malware campaigns. FluBot fools its victims using clever lures and TangleBot can be used to spy on the victims.

Photo by Icons8 Team on Unsplash

August 27, 2021

Felipe Ruiz

Find out about LockBit, now in its menacing 2.0 version

In this post, you'll learn in general terms what LockBit ransomware is, what its characteristics are and why it can pose a significant threat to your business.

Photo by Roi Dimor on Unsplash

July 26, 2021

Felipe Zárate

The spyware that threatens the world

In this post, we will look at the software everyone is talking about: Pegasus.

Photo by Calvin Ma on Unsplash

July 9, 2021

Andres Roldan

Dynamic in-memory AMSI bypass

In this article we will be able to bypass AMSI using memory patching.

Start your 21-day free trial

Discover benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial