221,889 people reacted Pulling Back the Curtains on EncodedCommand PowerShell Attacks By Jeff White March 10, 2017 at 5:00 AM 27 29 min. read
37,571 people reacted Farming Malicious Documents to Unravel Ransomware By Jeff White January 27, 2017 at 1:00 PM 11 6 min. read
41,376 people reacted Pythons and Unicorns and Hancitor…Oh My! Decoding Binaries Through Emulation By Jeff White August 30, 2016 at 1:20 PM 8 11 min. read
VB Dropper and Shellcode for Hancitor Reveal New Techniques Behind Uptick By Jeff White August 21, 2016 at 5:00 PM 6 7 min. read
How to Track Actors Behind Keyloggers Using Embedded Credentials By Jeff White July 12, 2016 at 3:00 PM 22 8 min. read
Ransomware: Locky, TeslaCrypt, Other Malware Families Use New Tool To Evade Detection By Jeff White, Chris Astacio and Micah Yates April 8, 2016 at 9:50 AM 11 5 min. read
KeyBase Threat Grows Despite Public Takedown: A Picture is Worth a Thousand Words By Jeff White February 25, 2016 at 5:00 AM 15 24 min. read
SpiderMal: Deep PassiveDNS Analysis with Maltego By Jeff White January 29, 2016 at 10:30 AM 6 3 min. read
ProxyBack Malware Turns User Systems Into Proxies Without Consent By Jeff White December 23, 2015 at 3:00 PM 14 10 min. read