Stay updated with the latest cybersecurity news.


Guess who’s back? Virus.Ramnit is here (to stay?)

Tue Jun 23 2020

Virus.Ramnit first made its appearance back in 2010 in the form of a rather simplistic…


Securing your business’ growth with internal security technology

Thu Jun 18 2020

Like an organism, a business must grow and evolve to survive. Also like an organism,…


Dealing with JavaScript obfuscations – Part 3

Sun Jun 07 2020

So in the last part, we learned how to deal with some Garbage and Linked…


Dealing with JavaScript obfuscations – Part 2

Mon Jun 01 2020

In part one, we learned about Javascript as a malware and we started to understand…


Dealing with JavaScript obfuscations – Part 1

Wed May 27 2020

Using JavaScript in cyber attacks is not exactly new, but more and more attackers are…


Multistage malware breakdown – Part 2

Sun May 17 2020

In the last part, we started analyzing an HTA file, which revealed a Powershell script…


Multistage malware breakdown – Part 3

Sun May 17 2020

The Ads.jpg analysis So after extracting the information from the VBScript, we saw a download…


Multistage malware breakdown – Part 1

Wed May 13 2020

Nowadays, malware is more sophisticated due to the use of obfuscation techniques. The goal of…


Get some ‘quarantime’ with your kids

Mon May 11 2020

Unprecedented, unusual, unwanted; shelter-in-place life is all that and more. Yet, according to medical experts,…


Essential tech tools for staying connected while working apart

Sun Apr 19 2020

The COVID-19 pandemic has brought about an avalanche of changes and affected the lives of…