White Papers

86 reports

Windows Exploitation in 2015

Windows Exploitation in 2015

A new version of our earlier report on major trends in Windows exploitation and mitigation for 2015.


Windows 10: Should you go there?

Windows 10: Should you go there?

Windows 10: Should you go there?


Is Anti-Virus dead?

Is Anti-Virus dead?

Is Anti-Virus dead?


Unpack Your Troubles: .NET packer tricks countermeasures

Unpack Your Troubles: .NET packer tricks countermeasures

Nowadays, .NET samples are increasingly common, necessitating specialized techniques for processing and analysis, especially when obfuscation is used: .NET packers have many tricks up their sleeves, but fortunately we do too.


Operation Liberpy’: Keyloggers and information theft in Latin America

Operation Liberpy’: Keyloggers and information theft in Latin America

Operation Liberpy’: Keyloggers and information theft in Latin America


Operation Potao Express: Analysis of a cyber-espionage toolkit

Operation Potao Express: Analysis of a cyber-espionage toolkit

Operation Potao Express: Analysis of a cyber-espionage toolkit


Dissecting Linux/Moose

Dissecting Linux/Moose

The Analysis of a Linux Router-based Worm Hungry for Social Networks


CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails

CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails

CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails


Unboxing Linux/Mumblehard

Unboxing Linux/Mumblehard

Linux/Mumblehard is a family of malware targeting servers running both the Linux and BSD operating systems.