A threat actor has leaked the complete source code for the Babuk ransomware on a Russian-speaking hacking forum.| BleepingComputer
Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit. This is common behavior that can be used across different platforms and the network to evade defenses. | attack.mitre.org
DS0017| attack.mitre.org
With Cisco Secure Malware Analytics (formerly Threat Grid) you gain dynamic malware analysis, sandboxing, and threat intelligence feeds for threat visibility and network security.| Cisco