top of page
Home
About Us
Contact Us
Blog
Our Services
Incident Rssponse & Digital Forensics
Cyber Threat Hunting
App Security & Penetration Testing
Cloud Security Engineering
Services
Use tab to navigate through the menu items.
IR Retainer Service
IR Retainer Service
Embrace for impact, respond effectively, prepare constantly
Cyber Security Awareness
for Employees
Cyber Security Awareness
for Employees
Under Attack!
I'm Under Attack
All Posts
DFIR
Application Security
Threat Hunting
Malware Analysis
Mar 27, 2023
15 min read
Malware Analysis
Dark Power Ransomware Analysis
Table of Contents Introduction A few words about Nim Dark Power Modus Operandi Technical analysis Conclusions Indicators of compromise...
Jun 5, 2022
3 min read
Malware Analysis
Equation Editor Exploit - An Old Story
This post is part of our short articles on analyzing malicious Office documents. The content addresses the old, and yet, very relevant,...
May 20, 2022
11 min read
Malware Analysis
How To Analyze Office Documents? (Emotet Maldoc)
Part 1 in the Malicious Office documents Analysis series, a straight-forward set of blog posts for entry-level malware analysis
bottom of page