Malware
How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger
Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse engineering .NET malware. The write-up outlines the importance of sandbox analysis...
THREATS
What is Global Threat Intelligence? – SOC/DFIR Team Guide
Global threat intelligence (GTI) is crucial for cybersecurity as it offers real-time data on emerging and persistent cyber threats worldwide.Threats can originate anywhere,...
Cyber Attack
How ANY.RUN Malware Sandbox Process IOCs for Threat Intelligence Lookup?
The database includes indicators of compromise (IOCs) and relationships between different artifacts observed within an analysis session. In October 2022, ANY.RUN launched TI Threat...
Cyber AI
DarkGPT – A ChatGPT-4 Powered OSINT Tool To Detect Leaked Databases
DarkGPT, your next-level OSINT (Open Source Intelligence) assistant. In this digital era, the ability to sift through vast amounts of data is invaluable, and...
Cyber AI
OpenCTI: OSINT Platform to SOC & MDR Teams for Malware Analysis
ANY.RUN now integrates with OpenCTI, a cyber threat intelligence platform that allows automatic enrichment of OpenCTI observations with malware data directly from ANY.RUN analysis. Users...
Cyber Crime
Combining Threat Intelligence Platforms & Sandboxes for Efficient Security Operations – A DFIR Guide
Organizations have many tools when investigating cyber threats, but two stand out: Threat Intelligence Platforms (TIPs) and sandboxes.Each solution provides distinct advantages, yet...
cyber security
How to Create a Sandbox Environment For Malware Analysis – A Complete Guide
In cybersecurity, the battle against malware is critical, akin to handling dangerous pathogens.The importance of secure environments for analyzing malware cannot be overstated,...
ChatGPT
HackerGPT – A ChatGPT-Powered AI Tool for Ethical Hackers & Cyber Security Community
HackerGPT is a cutting-edge AI tool designed explicitly for the cybersecurity sector, particularly beneficial for individuals involved in ethical hacking, such as bug bounty...