<img src="https://ws.zoominfo.com/pixel/JrRu3vUM8j33QSR7Bwxw" width="1" height="1" style="display: none;">

Threat Research

May 28, 2020

Spying on SpyNet

Using static analysis, it is possible to find out what the evolution of SpyNet looked like, how different versions can be found without even looking at the code, and how to find its authors so their future activities can be monitored.
April 16, 2020

Mining for malicious Ruby gems

Typosquatting barrage on RubyGems software repository users
April 2, 2020

Hawkish applications lurking in your MacOS environment

Catching the Proton Backdoor in your Video
March 25, 2020

Unpacking the Kwampirs RAT

Exposing Attack Campaigns, Hunting Threats and Delivering Actionable Threat Intelligence
March 23, 2020

Exposing Ryuk Variants Using YARA

Getting Ahead of Ryuk attacks using YARA Rules - Continued
March 6, 2020

Sneaky Tools Infiltrating Your Mac Fortress

Potentially Unwanted Apps Masquerade as Well Behaved Applications