Intelligence-driven search and analysis function
Second line of defence tailored for enterprise security teams
In the second part of our research with Proofpoint, we take a comprehensive look at the Bitter espionage group, its malware payload arsenal, shared TTPs and provide IOCs and YARA rules .
In this blog post we detail the analysis of a .NET multi-stage malware loader that delivers stealers, RATs, and keyloggers.
We are proud to announce Threatray Release v2.0. Dive in below to discover its highlights.
TeamT5 and Threatray are teaming up in a joint research collaboration to level up threat actor tracking and malware analysis.
Our code search engine has discovered that Boramae is a new variant of Beast Ransomware.
Our code search engine has discovered AidLocker/Frag, variants of HellCat/Morpheus.
By clicking “Accept All”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.