
The Anomali Blog
Malware


12 Days of Threats

What I’ve Learned as a Part-Time Cyber Threat Analyst Using Anomali Match

How Ransomware has become an ‘Ethical’ Dilemma in the Eastern European Underground

Hacker Tactics - Part 2: Supply Chain Attacks

Hacker Tactics - Part 1: Domain Generation Algorithms

WTB: US Arrests Chinese Man Involved With Sakula Malware Used in OPM and Anthem Hacks

Halt the Sidecar Bear’s infrastructure with Intel 471 and Anomali Threatstream

How Threat Hunting Can Help Defend Against Malware Attacks

Petya (NotPetya, Petrwrap)

Ukraine hit hard as Petya Ransomware Variant Spreads around the world
