We recently encountered a large obfuscated malware sample that offered several interesting analysis challenges. It used virtualization that prevented us from producing a fully-deobfuscated memory dump...
Read moreIn December 2019, we published a blog post on augmenting analysis using Microsoft Excel for various data sets for incident response investigations. As we described,...
Read moreIn December 2019, we published a blog post on augmenting analysis using Microsoft Excel for various data sets for incident response investigations. As we described,...
Read moreIn December 2019, we published a blog post on augmenting analysis using Microsoft Excel for various data sets for incident response investigations. As we described,...
Read moreIn December 2019, we published a blog post on augmenting analysis using Microsoft Excel for various data sets for incident response investigations. As we described,...
Read moreWhen we discover new intrusions, we ask ourselves questions that will help us understand the totality of the activity set. How common is this activity? Is there anything...
Read moreWhen we discover new intrusions, we ask ourselves questions that will help us understand the totality of the activity set. How common is this activity? Is there anything...
Read moreWhen we discover new intrusions, we ask ourselves questions that will help us understand the totality of the activity set. How common is this activity? Is there anything...
Read moreWhen we discover new intrusions, we ask ourselves questions that will help us understand the totality of the activity set. How common is this activity? Is there anything...
Read moreCrescendo: Real Time Event Viewer for macOS
March 9 2020Prior to 2017, researchers couldn’t easily monitor actions performed by a process on macOS and had to resort to coding scripts that produced low level system call...
Read more
Recent Comments