Tool spotlight: YARA

Tool spotlight: YARA

In today’s blog post, we will be going over a tool that is a must-have in every security analyst’s arsenal. Even if you won’t use it every day, it is helpful to understand what malware signatures look like in the background. YARA is a powerful...
Malware steal data from other hackers

Malware steal data from other hackers

Cybercriminals using Prynt Stealer to collect data from victims are being swindled by the malware developer, who also receives a copy of the info over Telegram messaging service. The malware developer has planted in the builder for the infostealer a backdoor that is...

Pin It on Pinterest