Emulation of Kernel Mode Rootkits With Speakeasy
January 20 2021In August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreIn August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreThe techniques used in real-world combat apply in cybersecurity operations, except that instead of bullets flying downrange, it's packets.
Read moreSeven flaws in DNSMasq have limited impact, but in combination they could be chained to create a multistaged attack.
Read moreEnforcement mode for the Netlogon Domain Controller will be enabled by default with the Feb. 9 security update.
Read moreMeanwhile, Malwarebytes is the latest victim, Symantec discovers a fourth piece of malware used in the massive attack campaign, and FireEye Mandiant releases a free tool to help spot...
Read moreHere's to the sneakiest of the sneaky. These clever phishing messages -- that standard validation measures often missed -- deserve proper dishonor.
Read moreHere's to the sneakiest of the sneaky. These clever phishing messages -- that standard validation measures often missed -- deserve proper dishonor.
Read moreBuilding security into the software development life cycle creates more visibility, but CISOs still need stay on top of any serious threats on the horizon, even if they are...
Read moreBest practices for a shifting visibility landscape.
Read more
Recent Comments