Malicious eFax Attachments Can Potentially Steal Your Microsoft O365 Password
Automated Obfuscation of Windows Malware and Exploits Using O-LLVM
Ransomware Attacks Are on the Rise, Should You Pay the Ransom?
The CISO asked me to run Ransomware on his laptop
Using Intezer Analyze to Reveal Malware Ancestry and Assist IR and Forensic Investigations
Unpacking script2exe Malware
AppLocker and Software Restriction Policies
Prepare for Ransomware: Delivery and Defense (Part 3 in a Series on Ransomware)
Deconstructing the Ransomware Kill Chain (Part 2 in a Series on Ransomware)
The Proliferation of Ransomware (Part 1 in a Series on Ransomware)
Unwrap Your Malware
The Simplicity of VBA Malware (Part 2 of 2)
The Simplicity of VBA Malware (Part 1 of 2)
AppLocker and Software Restriction Policies
Prepare for Ransomware: Delivery and Defense (Part 3 in a Series on Ransomware)
Deconstructing the Ransomware Kill Chain (Part 2 in a Series on Ransomware)
The Proliferation of Ransomware (Part 1 in a Series on Ransomware)
Unwrap Your Malware
The Simplicity of VBA Malware (Part 2 of 2)
The Simplicity of VBA Malware (Part 1 of 2)