Cyber Security

Investing in Cyber Security: Why It’s Important to Protect Your Company During a Pandemic

Below is a short video highlighting the importance of investing in cyber security during a time where more employees are working from home. By keeping company infrastructures from vulnerable attacks, cyber security has become a key component to help malicious attacks from happening.

READ MORE
Cyber Security

Partner Q&A: Protecting Critical Healthcare Infrastructure from Disruption

Healthcare facilities around the world are under overwhelming pressure right now as the COVID-19 pandemic is straining every facet of their organizations. Adding to this challenge is the fact that criminal organizations are showing no signs of letting up. INTERPOL warned that cybercriminals are increasingly attempting to ‘lockout hospitals out of critical systems by attempting […]

READ MORE
Product Features

Intelligent Monitoring: Auto-Focus for Malware Analysts

Intelligent Monitoring captures everything that’s relevant and only what’s relevant, so your Security Team can focus on what’s most critical & essential. In explaining what had motivated his team to switch to VMRay Analyzer, a customer told us, “It’s not about getting our analysts started with malware analysis. It’s getting them to stop!” VMRay, he […]

READ MORE
Cyber SecurityProduct Features

Our Statement on Spectre and Meltdown

Spectre and Meltdown are attack methodologies enabled by fundamental processor design principles. In particular, they exploit unwanted side effects of caching, speculative/out-of-order execution, and branch target prediction. These features are part of most modern CPUs (Intel, AMD, ARM) and were widely introduced into production in the 1990s to enhance performance. As a result, the performance […]

READ MORE
Cyber SecurityMalware Analysis

Sandbox Evasion Techniques – Part 4

Sandbox Evasion Techniques Blog Series  Primer | Part 2 | Part 3 This is our final post in a series on sandbox evasion techniques used by malware today. We started with a primer, and then covered the other main categories of sandbox evasion techniques: Sandbox Detection: Detecting the presence of a sandbox (and only showing benign […]

READ MORE
Malware AnalysisProduct Features

Sandbox Evasion Techniques – Part 3

Sandbox Evasion Techniques Blog Series Primer | Part 2 | Part 4 This post is the third part in a series on sandbox evasion techniques used by malware today. We originally posted a primer, outlining the three main categories of evasion techniques by malware authors: Sandbox Detection: Detecting the presence of a sandbox (and only […]

READ MORE
Malware AnalysisProduct Features

Sandbox Evasion Techniques – Part 2

Sandbox Evasion Techniques Blog Series Primer | Part 3 | Part 4 In our initial post on sandbox evasion we outlined the three main categories of sandbox evasion techniques: Sandbox Detection: Detecting the presence of a sandbox (and only showing benign behavior patterns on detection) Exploiting Sandbox Gaps: Exploiting weaknesses or gaps in sandbox technology […]

READ MORE
Cyber SecurityMalware AnalysisProduct Features

Sandbox Evasion Techniques – Part 1

Sandbox Evasion Techniques Blog Series Part 2 | Part 3 | Part 4 This post is the first part in a series on sandbox evasion techniques used by malware today. After this primer, in subsequent posts, we’ll drill down deeper into the details for each of the three main categories of evasion techniques. The use […]

READ MORE
Cyber SecurityMalware Analysis

Powershell Ransomware – a PowerWare Deep Dive

Malware authors are always looking for an edge to evade detection and extend the useful life of their creations. In the constant cat-and-mouse game between malware authors and security vendors, malware authors must constantly revise and reinvent their product. They will consider anything they can do to avoid detection. Along these lines, Microsoft PowerShell has […]

READ MORE
Cyber SecurityProduct Features

Nowhere to Hide: Analyzing Environment-Sensitive Malware with Rewind

Malware that evades detection is nothing new. But in a constantly evolving threat landscape, particularly around targeted attacks, we now see more Environment-Sensitive Malware.  This is alternately known as context-aware or environment-aware malware. Not a low carbon footprint variety, but rather malware that is tailored to run only under certain conditions in the computing environment of the […]

READ MORE

Website designed and developed by Raincastle Communications, Inc.