Nickolas J BakerMar 16, 20233 minMalicious eFax Attachments Can Potentially Steal Your Microsoft O365 PasswordPhishing attack observed by Polito, Inc., which uses an obfuscated JavaScript attachment to show how to analyze the malicious attack.
Wade MaMar 3, 20209 minAutomated Obfuscation of Windows Malware and Exploits Using O-LLVMToday’s malware authors and exploit developers have automated methods of obfuscating their software, When these techniques are combined with
Fred MastrippolitoJun 18, 20192 minThe CISO asked me to run Ransomware on his laptopThe executive’s laptop had the very latest version of a cloud-based, next-generation antivirus endpoint detection and response software, whi
Liana ParakesyanFeb 21, 20194 minUsing Intezer Analyze to Reveal Malware Ancestry and Assist IR and Forensic InvestigationsToday, much of the malware still operates via the same concept of infecting machines and spreading throughout networks. Due to this, it only