Gootloader Isn’t Broken
In this post, we take a closer look at the Gootloader malware, correcting previous assertions about its dysfunction. Through the use of tools like Process Monitor and Burp Suite, we…
Da Samala Tech blogs on malware and stuffs
In this post, we take a closer look at the Gootloader malware, correcting previous assertions about its dysfunction. Through the use of tools like Process Monitor and Burp Suite, we…
In this concise exploration, we delve into the methodology behind tracking and analyzing SocGholish malware. Aimed at both newcomers and seasoned SOC Analysts, the article guides readers through the practical…
The cybersecurity landscape is rapidly evolving, with new threats emerging daily. This article explores five critical emerging threats that Security Operations Center (SOC) analysts must be aware of: AI-powered cyber…