YARA: Open-source tool for malware research

YARA is a powerful tool designed primarily to aid malware researchers in identifying and categorizing malware samples, though its applications are broader. The tool enables users to create detailed descriptions, or “rules,” for malware fami… Continue reading YARA: Open-source tool for malware research

WordPress Site Hacked to redirect stripe.js offsite for credit card skimming – Can’t Find The Source

We are experiencing an issue on our WordPress site running WooCommerce, for the second time this year where a hacker is injecting some kind of script that is redirecting the stripe.js code from it’s native location at stripe to an offsite … Continue reading WordPress Site Hacked to redirect stripe.js offsite for credit card skimming – Can’t Find The Source

x64dbg: Open-source binary debugger for Windows

x64dbg is an open-source binary debugger for Windows, designed for malware analysis and reverse engineering of executables without access to the source code. It offers a wide range of features and a plugin system, allowing you to customize and extend i… Continue reading x64dbg: Open-source binary debugger for Windows

MISP: Open-source threat intelligence and sharing platform

MISP is an open-source threat intelligence and sharing platform for collecting, storing, distributing, and sharing cybersecurity indicators and threats related to incident and malware analysis. MISP is designed by and for cybersecurity, ICT professiona… Continue reading MISP: Open-source threat intelligence and sharing platform

https://d1af033869.koo7.cloudfront.net why am I finding these things on my android when I dont own a windows based PC [closed]

I don’t even own a windows based PC, but my abusive criminal hacker does. While going through my settings to, as always, keep checking for signs that he’s hacked me again (he stole my SS number, so he can literally track me via anything li… Continue reading https://d1af033869.koo7.cloudfront.net why am I finding these things on my android when I dont own a windows based PC [closed]

The most prevalent malware behaviors and techniques

An analysis of 100,000+ Windows malware samples has revealed the most prevalent techniques used by malware developers to successfully evade defenses, escalate privileges, execute the malware, and assure its persistence. Malware tactics and techniques T… Continue reading The most prevalent malware behaviors and techniques