A key capability for malware is to prevent or delay analysis, usually by implementing dynamic malware analysis detection and evasion. When successful, this can substantially increase the time the malware can continue in the wild undetected, blocked or remediated. While most in-the-wild evasion techniques are rather simple, there also exist sophisticated detection methods that are […]READ MORE
COM Introduction The Component Object Model (COM) is quite an old technology that was introduced by Microsoft in the early 90s. It allows the development and usage of binary software components in a language and architecture independent way. To this end, COM classes are provided by COM servers and can be instantiated as COM objects by COM clients. The serving […]READ MORE
This article is provided by courtesy of VMRay GmbH. As part of her Summer Tour #NRWVierNull focusing on the progress of digital change, the Prime Minister of the German State of North Rhine-Westphalia, Hannelore Kraft, visited VMRay GmbH in Bochum on 15 July 2015. Cyber security is an important part of the shift to digital […]READ MORE
Website designed and developed by Raincastle Communications, Inc.