Get Familiar with Yara

Hipara heavily relies on Yara. It has become the defacto standard for sharing cyber intelligence about threat actors. But what is it? Let's take a look. »

Ransomware Encryption by Family

Ransomware families use different encryption methods. The great work done by @nyxbone shows ransomware families using everything from strong encryption like AES to weak obfuscation like »