Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

vmray.com

Get the latest updates from directly as they happen.

Follow now 110 followers

Latest posts

Last updated about 3 hours ago

April 2025 Detection Highlights: 4 New VMRay Threat Identifiers, Config Extractors, and a Rich Set of New YARA Rules.

about 3 hours ago

The Labs team at VMRay actively gathers publicly available data to identify...

Malware Detection Techniques: The Complete Guide

about 17 hours ago

As cybersecurity grows more complex, malware detection stands as a critical line...

Release Highlights: VMRay Platform 2025.2.0

5 days ago

Introduction The first release of 2025 is already behind us, but we’re...

Rethinking Cyber Threat Intelligence: A Strategic Shift Toward Resilience

6 days ago

Introduction Cyber threat intelligence (CTI) has become a cornerstone of cybersecurity operations...

Malware Obfuscation Techniques: Advanced Detection & Prevention Strategies

29 days ago

In the growing arms race between security experts and hackers, malware obfuscation...

March 2025 Detection Highlights: Detecting CPU Property Queries and Another Month of YARA Rules.

about 1 month ago

The Labs team at VMRay actively gathers publicly available data to identify...

How Northwestern Mutual accelerated threat investigation with VMRay

about 2 months ago

When it comes to cybersecurity, speed and accuracy are everything — especially...

February 2025 Detection Highlights: A Record Month of New YARA Rules

2 months ago

The Labs team at VMRay actively gathers publicly available data to identify...

Malware & Phishing Threat Landscape Report – 2024/2

2 months ago

Executive summary: The second half of 2024 shows how attackers are continuing...

What is SEO Poisoning? A Growing Threat to Cybersecurity

2 months ago

Introduction SEO poisoning, also known as search poisoning, is a cyberattack technique...

DLL Sideloading: What It Is and How to Detect It

2 months ago

Introduction DLL sideloading is a widely used attack technique that exploits how...

What is Credential Harvesting? Detection & Prevention Techniques

2 months ago

Credential harvesting is a cyberattack technique in which adversaries steal user login...