Three interesting changes in malware activity over the past year
Every day, our Lastline sensors observe millions of files that our customers download from the Internet or receive as email...
Every day, our Lastline sensors observe millions of files that our customers download from the Internet or receive as email...
Bridging static and dynamic analysis using Lastline process snapshotting Authored by: Arunpreet Singh and Dr. Christopher Kruegel ...
Authored by: Arunpreet Singh and Clemens Kolbitsch The use of runtime-packing of malware has long become the standard to defeat traditional AV products. At...
In October 2015, at the ACM CCS 2015 conference, my colleagues Dennis Andriesse and Victor van der Veen from the Vrije Universiteit...
Authored by: Clemens Kolbitsch and Arunpreet Singh Another week comes to an end, another wave of evasive malware is attacking users. This week: Shifu. This...
Authored by: Clemens Kolbitsch, Joe Giron, and Arunpreet Singh Over recent years, we have seen a rapid evolution of security products. Whenever a...
Authored by: Arunpreet Singh, Clemens Kolbitsch The Turla malware family is part of one of the most sophisticated malware families seen in...
Authored by: Arunpreet Singh, Roman Vasilenko In their Youtube commercial, the infamous Hacking Team promises to their clients, who are typically government or law...
A large set of publicly disclosed Advanced Persistent Threat (APT) and nation state attacks use sophisticated malware (e.g Turla, Duqu,...
Authored by: Joe Giron, Clemens Kolbitsch Waves of evasive malware keep rolling in. The latest in the series: Rombertik. This malware...
This is an necessary category.
This is an non-necessary category.