Cyber Writes

Cyber Writes

LOCKBIT 3.0 Ransomware – Complete Malware Analysis ReportLOCKBIT 3.0 Ransomware – Complete Malware Analysis Report

LOCKBIT 3.0 Ransomware – Complete Malware Analysis Report

LockBit 3.0 is a sophisticated ransomware identified as a significant threat to organizations worldwide. This ransomware variant is designed to…

1 year ago
Hackers Selling DCRat Malware Subscriptions For $5 on TelegramHackers Selling DCRat Malware Subscriptions For $5 on Telegram

Hackers Selling DCRat Malware Subscriptions For $5 on Telegram

Researchers from ANY.RUN reported a new wave of DCRat malware, known for its wide array of harmful functions, selling the…

1 year ago
HackerGPT – A ChatGPT-Powered AI Tool for Ethical Hackers & Cyber Security CommunityHackerGPT – A ChatGPT-Powered AI Tool for Ethical Hackers & Cyber Security Community

HackerGPT – A ChatGPT-Powered AI Tool for Ethical Hackers & Cyber Security Community

HackerGPT is a cutting-edge AI tool designed explicitly for the cybersecurity sector, particularly beneficial for individuals involved in ethical hacking,…

1 year ago
1000 Best Google Dorks List (Google Hacking Guide) – 20241000 Best Google Dorks List (Google Hacking Guide) – 2024

1000 Best Google Dorks List (Google Hacking Guide) – 2024

Google Dorks List "Google Hacking" mainly refers to pulling sensitive information from Google using advanced search terms that help users search…

1 year ago
How to Analyse Linux Malware in ANY.RUNHow to Analyse Linux Malware in ANY.RUN

How to Analyse Linux Malware in ANY.RUN

Linux, traditionally viewed as a more secure operating system than Windows, has experienced a notable increase in malware attacks. In…

1 year ago
How to Analyse an Advanced Phishing Attack with ANY.RUN Threat Intelligence LookupHow to Analyse an Advanced Phishing Attack with ANY.RUN Threat Intelligence Lookup

How to Analyse an Advanced Phishing Attack with ANY.RUN Threat Intelligence Lookup

An advanced phishing attack typically involves sophisticated tactics such as compelling email and website replicas that are often tailored to…

1 year ago
ZLoader Now Attack 64-bit Windows: Live Analyse With ANY.RUN SandboxZLoader Now Attack 64-bit Windows: Live Analyse With ANY.RUN Sandbox

ZLoader Now Attack 64-bit Windows: Live Analyse With ANY.RUN Sandbox

ZLoader is a banking Trojan malware that steals sensitive financial information from infected systems. Threat actors exploit this malware to…

1 year ago
Why and How to Extract Malware Configurations in a SandboxWhy and How to Extract Malware Configurations in a Sandbox

Why and How to Extract Malware Configurations in a Sandbox

Indicators of Compromise (IOCs) are the fuel that powers our cybersecurity defenses and keeps them effective. The most sought-after source…

1 year ago
Combat Phishing Attacks With AI-Powered Email Threat Protection: Packet Guide 2024Combat Phishing Attacks With AI-Powered Email Threat Protection: Packet Guide 2024

Combat Phishing Attacks With AI-Powered Email Threat Protection: Packet Guide 2024

Cybercriminals use email phishing as one form of cybercrime to deceive victims into disclosing personal information like passwords, credit card…

1 year ago
What is SaaS Sprawl? Guide to Combating SaaS Security RisksWhat is SaaS Sprawl? Guide to Combating SaaS Security Risks

What is SaaS Sprawl? Guide to Combating SaaS Security Risks

When we talk about the cloud, it's not just a matter of data drifting weightlessly in some digital ether. The…

1 year ago