+1.813.321.0987

Malware Hashes and Hash Functions

An Introduction to Malware Hashes and Hash Functions Malware hashes are found everywhere in our industry. And for a good reason. They very efficiently help identify malware samples and standardize the exchange of information among researchers, to name a couple of use...

InfoSec Articles (08/01/2022 – 08/16/2022)

Over the last two weeks, SC Media shared the top three email-based threats, what they have in common and how you can protect your organization. Also, more details about the Maui ransomware that has been used against US healthcare operations has been linked to...

InfoSec Articles (07/19/2022 – 08/01/2022)

Over the last two weeks, we saw the DUCKTAIL, infostealer Malware that is targeting Facebook Business Accounts. Also, Palo Alto release the new Incident Response Report 2022.For more articles, check out our #onpatrol4malware blog. The evolution of botnets and DDoS...