Exploit Analysis via Process Snapshotting
In this third post in our blog series on process snapshotting (see previous posts on PlugX and Shiz’ code injection),...
In this third post in our blog series on process snapshotting (see previous posts on PlugX and Shiz’ code injection),...
In our last blog-post on process snapshotting, we showed how process snapshots (or “dumps”) allow bridging the gap between dynamic...
Targeted attacks and so-called APTs (advanced persistent threats) come in many forms and colors. Very often, in-house malware analysis teams...
Every AV I've tested is helpless against Violent Python attacks; the only good defense I've found is...
Authored by: Kevin Hamacher, Dario Filho, Clemens Kolbitsch One notorious functionality present in many variants of today’s advanced malware is the ability...
Much has been said in recent weeks about the state of antivirus technology. To add facts to the debate, Lastline...
In our effort to detect threats to the users of Android devices, we analyze a lot of malicious apps. This...
An area where we spend quite some effort here at Lastline is scaling up our malware analysis capabilities, that is...
Automated malware analysis systems (or sandboxes) are one of the latest weapons in the arsenal of security vendors. Such systems...
Researchers from UCSB and University of Bonn recently published a paper on the risks incurred by dynamically loaded external...
This is an necessary category.
This is an non-necessary category.