Browsing Tag
Threat Intelligence
9 posts
How Attackers Use Corrupted Files to Slip Past Security
New zero-day attack bypasses antivirus, sandboxes, and spam filters using corrupted files. Learn how ANY.RUN’s sandbox detects and…
December 3, 2024
How Python Software Development Enhances Cyber Defense
Python has emerged as a powerful ally in combating rising cybersecurity threats and tracking cybercrime through tools leveraging…
November 29, 2024
A Step-by-Step Guide to How Threat Hunting Works
Stay ahead of cybercrime with proactive threat hunting. Learn how threat hunters identify hidden threats, protect critical systems,…
November 1, 2024
332 Million Email Addresses Scraped from SOCRadar.io Published Online
A hacker known as USDoD claims to have scraped 332 million email addresses from SOCRadar.io, which were later…
August 5, 2024
Analysis of Top Infostealers: Redline, Vidar and Formbook
Protect your data from cyber threats: Learn about RedLine, Vidar, and FormBook infostealers, their tactics, and how ANY.RUN’s…
July 31, 2024
The Evolution of Cybercrime Investigation
Cybercrime costs trillions, rising yearly. Criminals operate globally, teaching their methods. This article explores major cyberattacks from 1962…
July 14, 2024
Python in Threat Intelligence: Analyzing and Mitigating Cyber Threats
In the world of emerging cybersecurity threats, understanding the significance of threat intelligence is crucial and can not…
January 10, 2024
Behavior-based vs IOC-based Threat Detection Approaches: How to Prioritize?
Acore cybersecurity procedure usually includes running detection rules based on the Indicators of Compromise (IOCs). However, the latest…
March 15, 2022
Key Features Of Threat Intelligence Platforms
Threat intelligence platforms (TIP) keep the company updated about new potential threats and attacks. Let’s dig deeper into…
January 30, 2022