Categories

Tag Archives: malware analysis

Malware with Packer Deception Techniques

Find out how malware fools common file scanners.

Malicious Messages Foray Facebook

A trojan is circulating through Facebook stealing accounts and (probably) taking creds.

Observing COM within Malicious Code

How malware leverages the Component Object Model

Using Good Code for Bad Things

See how malware takes good code and makes it bad.

How to Unpack a Self-Injecting Citadel Trojan

A ‘how-to’ guide on unveiling the Citadel Trojan’s code.

Next Page »

Subscribe to our YouTube Channel