Posts tagged Malware

Exposure Management
Update on SolarWinds Supply-Chain Attack: SUNSPOT, SUNSHUTTLE and New Malware Family Associations
boB Rudis

Vulnerabilities and Exploits
The BadRabbit Ransomware Attack: What You Need To Know
boB Rudis

Exposure Management
The CIS Critical Controls Explained- Control 8: Malware Defenses
Caspian Kilkelly

Detection and Response
Introspective Intelligence: Understanding Detection Techniques
Mike Scutt

Vulnerabilities and Exploits
Malware and Advanced Threat Protection: A User-Host-Process Model
Tim Stiller

Vulnerabilities and Exploits
Ransomware FAQ: Avoiding the latest trend in malware
Tod Beardsley

Vulnerabilities and Exploits
What Exactly is Duqu 2.0?
Tim Stiller

Vulnerabilities and Exploits
ByeBye Shell and the Targeting of Pakistan
nex

Vulnerabilities and Exploits
Skynet, a Tor-powered botnet straight from Reddit
nex

Threat Research
Analysis of the FinFisher Lawful Interception Malware
nex

Vulnerabilities and Exploits
Cuckoo Sandbox 0.4 Simplifies Malware Analysis with KVM support, Signatures and Extended Modularity
nex