<img src="https://ws.zoominfo.com/pixel/JrRu3vUM8j33QSR7Bwxw" width="1" height="1" style="display: none;">

ReversingLabs Blog

June 26, 2020

Five Uses of YARA

Setting the Stage for REVERSING 2020
June 23, 2020

Hidden Cobra - from a shed skin to the viper’s nest

Enriching public threat intelligence
June 5, 2020

Retread Ransomware

In March of 2020, MalwareHunterTeam discovered a downloader which installed both a KPot infostealer as well as a second payload which was a ransomware variant that used the string "CoronaVirus".
May 28, 2020

Spying on SpyNet

Using static analysis, it is possible to find out what the evolution of SpyNet looked like, how different versions can be found without even looking at the code, and how to find its authors so their future activities can be monitored.
May 12, 2020

Modern Architectures Require New Security Strategies for Digital Assets

Monitoring your Security DMZ and Securing your File Uploads
May 6, 2020

Introducing Explainable Threat Intelligence

Next-generation threat detection and hunting algorithms built for humans