qkG: Simple Malware, Tricky Ransomware
By Oleg Boyarchuk and Stefano Ortolani Introduction When ransomware behavior is clearly exhibited, it is relatively easy for a sandbox or a...
By Oleg Boyarchuk and Stefano Ortolani Introduction When ransomware behavior is clearly exhibited, it is relatively easy for a sandbox or a...
Authored by: Alexander Sevtsov Edited by: Stefano Ortolani In the previous article, we have described an attack that makes use of a...
A Sandbox is a dynamic file analysis system that allows a researcher to analyze the behavior of potentially malicious code...
We've recently discovered a malicious Office Excel file that appeared to have the ability to download and execute malware. Examining...
Breach Detection Systems (BDS) trap attacks that display sufficient evidence of a possible breach, but are at risk of false...
Authored by: Alexander Sevtsov Phishing emails with suspicious attachments are one of the most popular malware delivery vectors today. These attachments...
Executable compression, aka “packing,” is a means of compressing an executable file and combining the compressed data with decompression code...
Malware continues to evolve and to fool most sandboxes. It will frequently take an alternate approach to accomplish an old...
One would be surprised to find how much hacking and malware analysis have in common. On the surface, they seem like...
[Ransomware Series Part 3] Authored by: Alexander Sevtsov This is the third installment of a multipart series on ransomware. While this segment...
This is an necessary category.
This is an non-necessary category.