Cybersecurity agencies in the U.S. and U.K. are warning about a custom malware called Firestarter persisting on Cisco ...
IntroductionOn March 12, 2026, Zscaler ThreatLabz discovered a malicious ZIP archive containing military-themed document lures targeting Chinese-speaking individuals. Our analysis of this sample ...
When 500,000 Findings Hide 14 Real Threats Modern enterprises ingest vulnerability data from dozens of sources: endpoint ...
Cybersecurity researchers have flagged a new malware called ZionSiphon that appears to be specifically designed to target ...
Abstract: Adaptive Security Mechanisms (ASMs) are vital in the era of Cloud Computing (CC) for handling Evolving Threats (ETs). Nevertheless, none of the existing works concentrated on examining the ...
ShadowStep is a research-oriented tool designed to execute an encrypted shellcode, ensuring that it is never fully decrypted in memory. At any given time, only a single instruction is available in ...
A zero-day flaw in open source browser, Chromium, which was patched recently, was exploited by a financially motivated North Korean threat actor, Citrine Sleet, to deliver the FudModule rootkit. The ...
A small program to load 32-bit shellcode and allow for execution or debugging. Can also output PE files from shellcode. This tool combines several shellcode analysis capabilities, often found in ...
GuLoader is an advanced malware downloader that uses a polymorphic shellcode loader to dodge traditional security solutions CrowdStrike researchers expose complete GuLoader behavior by mapping all ...
In a previous post we provided some background on the !exploitable Crash Analyzer which was released earlier this year. One of the things that we didn’t mention is that !exploitable is just one of the ...