When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief 4,799 people reacted When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief By Siddharth Sharma October 26, 2023 at 6:00 AM 63 4 min. read
Leveraging a Hooking Framework to Expand Malware Detection Coverage on the Android Platform 3,415 people reacted Leveraging a Hooking Framework to Expand Malware Detection Coverage on the Android Platform By Lee Wei Yeong, Xingjiali Zhang, Yang Ji and Wenjun Hu October 6, 2023 at 6:00 AM 15 13 min. read
Navigating the Vast Ocean of Sandbox Evasions 57,030 people reacted Navigating the Vast Ocean of Sandbox Evasions By Esmid Idrizovic, Bob Jung, Daniel Raygoza and Sean Hughes December 27, 2022 at 6:00 AM 10 13 min. read
Blowing Cobalt Strike Out of the Water With Memory Analysis 72,976 people reacted Blowing Cobalt Strike Out of the Water With Memory Analysis By Dominik Reichel, Esmid Idrizovic and Bob Jung December 2, 2022 at 6:00 AM 23 15 min. read
Ransomware Families: 2021 Data to Supplement the Unit 42 Ransomware Threat Report 45,857 people reacted Ransomware Families: 2021 Data to Supplement the Unit 42 Ransomware Threat Report By Guang Qing He, Cecil Liu, Aiden Huang and Royce Lu July 28, 2021 at 6:00 AM 56 7 min. read
Evade Sandboxes With a Single Bit – the Trap Flag 39,471 people reacted Evade Sandboxes With a Single Bit – the Trap Flag By Mark Lim July 19, 2021 at 3:30 PM 35 5 min. read