Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer 5,785 people reacted Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer By Mark Lim and Zong-Yu Wu January 5, 2024 at 3:00 AM 33 6 min. read
Teasing the Secrets From Threat Actors: Malware Configuration Parsing at Scale 67,447 people reacted Teasing the Secrets From Threat Actors: Malware Configuration Parsing at Scale By Mark Lim, Daniel Raygoza and Bob Jung May 3, 2023 at 6:00 AM 5 9 min. read
Tailoring Sandbox Techniques to Hidden Threats 53,517 people reacted Tailoring Sandbox Techniques to Hidden Threats By Esmid Idrizovic, Bob Jung, Daniel Raygoza and Sean Hughes March 20, 2023 at 6:00 AM 7 9 min. read
Machine Learning Versus Memory Resident Evil 64,567 people reacted Machine Learning Versus Memory Resident Evil By Akshata Rao, Esmid Idrizovic, Sujit Rokka Chhetri, Bob Jung and Mark Lim January 31, 2023 at 6:00 AM 10 12 min. read
Navigating the Vast Ocean of Sandbox Evasions 57,809 people reacted Navigating the Vast Ocean of Sandbox Evasions By Esmid Idrizovic, Bob Jung, Daniel Raygoza and Sean Hughes December 27, 2022 at 6:00 AM 10 13 min. read
Blowing Cobalt Strike Out of the Water With Memory Analysis 73,888 people reacted Blowing Cobalt Strike Out of the Water With Memory Analysis By Dominik Reichel, Esmid Idrizovic and Bob Jung December 2, 2022 at 6:00 AM 24 15 min. read