July 18, 2019

How to Prioritize High-Risk Phishing Attacks You Otherwise Miss

How can you how to mitigate phishing attacks and respond quickly to high-priority threats when you can't even detect or identify them?
July 17, 2019

SupPy Chain Malware - Detecting malware in package manager repositories

Malicious actors are constantly on the lookout for new attack vectors and techniques, using them to infiltrate even the most secure of organizations.
July 16, 2019

Catching deceptive links before the click

Email-based attacks are a nightmare personified for every defender out there. The average organization receives thousands upon thousands of email messages carrying attachments and links every day.
July 03, 2019

7 Common Mistakes to Avoid in Choosing a File Reputation Service

File reputation services check the reputation of files against extensive, up-to-date malware databases to identify threats and assess potential harm.
June 27, 2019

The Power of Automated Static Analysis

Automated static analysis is not subject to traditional virtualization and sandbox evasion techniques and takes place in milliseconds, regardless of file type, size, target OS or platform.
June 21, 2019

Digital Certificates - Models for Trust and Targets for Misuse

To automate the whole process, different actors have been developing tools that can spoof entire certificate chains and automatically sign applications.