Analyzing MAC Based Malware — LummaStealerLet’s try and analyze a MAC based malware sample. If you want to follow along, spin up a VM in an isolated environment and let’s get…Jan 24Jan 24
Decoding LummaStealerFake Captchas have long been a common method for delivering malware. A similar tactic was observed on a site hosting a heavily obfuscated…Jan 231Jan 231
How to get started in Cyber SecurityAre you looking to start your career in the field of Cyber Security but wondering where to start, how to start and many more questions…Jun 17, 2021Jun 17, 2021