Teasing the Secrets From Threat Actors: Malware Configuration Parsing at Scale 37,650 people reacted Teasing the Secrets From Threat Actors: Malware Configuration Parsing at Scale By Mark Lim, Daniel Raygoza and Bob Jung May 3, 2023 at 6:00 AM 4 9 min. read
Tailoring Sandbox Techniques to Hidden Threats 51,298 people reacted Tailoring Sandbox Techniques to Hidden Threats By Esmid Idrizovic, Bob Jung, Daniel Raygoza and Sean Hughes March 20, 2023 at 6:00 AM 4 9 min. read
Machine Learning Versus Memory Resident Evil 62,381 people reacted Machine Learning Versus Memory Resident Evil By Akshata Rao, Esmid Idrizovic, Sujit Rokka Chhetri, Bob Jung and Mark Lim January 31, 2023 at 6:00 AM 10 12 min. read
Navigating the Vast Ocean of Sandbox Evasions 55,263 people reacted Navigating the Vast Ocean of Sandbox Evasions By Esmid Idrizovic, Bob Jung, Daniel Raygoza and Sean Hughes December 27, 2022 at 6:00 AM 10 13 min. read
Blowing Cobalt Strike Out of the Water With Memory Analysis 65,827 people reacted Blowing Cobalt Strike Out of the Water With Memory Analysis By Dominik Reichel, Esmid Idrizovic and Bob Jung December 2, 2022 at 6:00 AM 21 15 min. read