Cyber Writes

How to Create a Sandbox Environment For Malware Analysis – A Complete Guide

In cybersecurity, the battle against malware is critical, akin to handling dangerous pathogens. The importance of secure environments for analyzing…

10 months ago

LOCKBIT 3.0 Ransomware – Complete Malware Analysis Report

LockBit 3.0 is a sophisticated ransomware identified as a significant threat to organizations worldwide. This ransomware variant is designed to…

10 months ago

Hackers Selling DCRat Malware Subscriptions For $5 on Telegram

Researchers from ANY.RUN reported a new wave of DCRat malware, known for its wide array of harmful functions, selling the…

10 months ago

HackerGPT – A ChatGPT-Powered AI Tool for Ethical Hackers & Cyber Security Community

HackerGPT is a cutting-edge AI tool designed explicitly for the cybersecurity sector, particularly beneficial for individuals involved in ethical hacking,…

10 months ago

1000 Best Google Dorks List (Google Hacking Guide) – 2024

Google Dorks List "Google Hacking" mainly refers to pulling sensitive information from Google using advanced search terms that help users search…

10 months ago

How to Analyse Linux Malware in ANY.RUN

Linux, traditionally viewed as a more secure operating system than Windows, has experienced a notable increase in malware attacks. In…

10 months ago

How to Analyse an Advanced Phishing Attack with ANY.RUN Threat Intelligence Lookup

An advanced phishing attack typically involves sophisticated tactics such as compelling email and website replicas that are often tailored to…

10 months ago

ZLoader Now Attack 64-bit Windows: Live Analyse With ANY.RUN Sandbox

ZLoader is a banking Trojan malware that steals sensitive financial information from infected systems. Threat actors exploit this malware to…

10 months ago

Why and How to Extract Malware Configurations in a Sandbox

Indicators of Compromise (IOCs) are the fuel that powers our cybersecurity defenses and keeps them effective. The most sought-after source…

11 months ago

Combat Phishing Attacks With AI-Powered Email Threat Protection: Packet Guide 2024

Cybercriminals use email phishing as one form of cybercrime to deceive victims into disclosing personal information like passwords, credit card…

11 months ago