White Papers
Windows Exploitation in 2015
Windows Exploitation in 2015
A new version of our earlier report on major trends in Windows exploitation and mitigation for 2015.
Windows 10: Should you go there?
Windows 10: Should you go there?
Is Anti-Virus dead?
Is Anti-Virus dead?
Is Anti-Virus dead?
Unpack Your Troubles: .NET packer tricks countermeasures
Unpack Your Troubles: .NET packer tricks countermeasures
Nowadays, .NET samples are increasingly common, necessitating specialized techniques for processing and analysis, especially when obfuscation is used: .NET packers have many tricks up their sleeves, but fortunately we do too.
Operation Liberpy’: Keyloggers and information theft in Latin America
Operation Liberpy’: Keyloggers and information theft in Latin America
Operation Potao Express: Analysis of a cyber-espionage toolkit
Operation Potao Express: Analysis of a cyber-espionage toolkit
Operation Potao Express: Analysis of a cyber-espionage toolkit
Dissecting Linux/Moose
Dissecting Linux/Moose
The Analysis of a Linux Router-based Worm Hungry for Social Networks
CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails
CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails
CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails
Unboxing Linux/Mumblehard
Unboxing Linux/Mumblehard
Linux/Mumblehard is a family of malware targeting servers running both the Linux and BSD operating systems.