Sharing is caring. Nowhere is this more true than for defenders that need to be able to quickly and seamlessly share critical information about malware and the attackers behind them. In the jargon of our industry that means using TIPs (Threat Intelligence Platforms) to ingest, export and correlate IOCs (Indicators of Compromise) and the TTPs (Tactics, […]READ MORE
This is our final post in a series on sandbox evasion techniques used by malware today. We started with a primer, and then covered the two other main categories of sandbox evasion techniques: Sandbox Detection: Detecting the presence of a sandbox (and only showing benign behavior patterns on detection) Exploiting Sandbox Gaps: Exploiting weaknesses or […]READ MORE
Website designed and developed by Raincastle Communications, Inc.