
Dealing with JavaScript obfuscations – Part 3
So in the last part, we learned how to deal with some Garbage and Linked…
So in the last part, we learned how to deal with some Garbage and Linked…
In part one, we learned about Javascript as a malware and we started to understand…
A growing number of companies have stepped up to help families, businesses, and teams navigate…
Using JavaScript in cyber attacks is not exactly new, but more and more attackers are…
Let’s be honest. The novelty of working from home has worn off. People, communities, and…
In the last part, we started analyzing an HTA file, which revealed a Powershell script…
The Ads.jpg analysis So after extracting the information from the VBScript, we saw a download…
Nowadays, malware is more sophisticated due to the use of obfuscation techniques. The goal of…
Unprecedented, unusual, unwanted; shelter-in-place life is all that and more. Yet, according to medical experts,…
Being a leader of remote work teams is many things, but easy isn’t one of…