Events and News

VMRay Closes $25 Million Series B

Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at US $25 Million Bochum, Germany – Dec 10, 2020 – VMRay, a provider of automated threat analysis and detection solutions, today announced that it has closed the second round of its Series B round of […]

READ MORE
Cyber Security

Investing in Cyber Security: Why It’s Important to Protect Your Company During a Pandemic

Below is a short video highlighting the importance of investing in cyber security during a time where more employees are working from home. By keeping company infrastructures from vulnerable attacks, cyber security has become a key component to help malicious attacks from happening.

READ MORE
Cyber Security

Partner Q&A: Protecting Critical Healthcare Infrastructure from Disruption

Healthcare facilities around the world are under overwhelming pressure right now as the COVID-19 pandemic is straining every facet of their organizations. Adding to this challenge is the fact that criminal organizations are showing no signs of letting up. INTERPOL warned that cybercriminals are increasingly attempting to ‘lockout hospitals out of critical systems by attempting […]

READ MORE
Product Features

Intelligent Monitoring: Auto-Focus for Malware Analysts

Intelligent Monitoring captures everything that’s relevant and only what’s relevant, so your Security Team can focus on what’s most critical & essential. In explaining what had motivated his team to switch to VMRay Analyzer, a customer told us, “It’s not about getting our analysts started with malware analysis. It’s getting them to stop!” VMRay, he […]

READ MORE
Cyber SecurityProduct Features

Our Statement on Spectre and Meltdown

Spectre and Meltdown are attack methodologies enabled by fundamental processor design principles. In particular, they exploit unwanted side effects of caching, speculative/out-of-order execution, and branch target prediction. These features are part of most modern CPUs (Intel, AMD, ARM) and were widely introduced into production in the 1990s to enhance performance. As a result, the performance […]

READ MORE
Cyber SecurityMalware Analysis

Sandbox Evasion Techniques – Part 4

Sandbox Evasion Techniques Blog Series  Primer | Part 2 | Part 3 This is our final post in a series on sandbox evasion techniques used by malware today. We started with a primer, and then covered the two main categories of evasion techniques sandbox detection, and exploiting malware sandbox gaps. In this post, we will be […]

READ MORE
Malware AnalysisProduct Features

Sandbox Evasion Techniques – Part 3

Sandbox Evasion Techniques Blog Series Primer | Part 2 | Part 4 This post is the third part in a series on sandbox evasion techniques used by malware today. We originally posted a primer, outlining the three main categories of evasion techniques by malware authors: Sandbox Detection: Detecting the presence of a sandbox (and only […]

READ MORE
Malware AnalysisProduct Features

Sandbox Evasion Techniques – Part 2

Sandbox Evasion Techniques Blog Series Primer | Part 3 | Part 4 In our primer on sandbox evasion we outlined the three main categories of sandbox evasion techniques: Sandbox Detection: Detecting the presence of a sandbox (and only showing benign behavior patterns on detection) Exploiting Sandbox Gaps: Exploiting weaknesses or gaps in sandbox technology or […]

READ MORE
Malware Analysis

Sandbox Evasion Techniques – Part 1

Sandbox Evasion Techniques Blog Series Part 2 | Part 3 | Part 4 This post is the first part in a series on sandbox evasion techniques used by malware today. After this primer, in subsequent posts, we’ll drill down deeper into the details for each of the three main categories of evasion techniques. The use […]

READ MORE
Cyber SecurityMalware Analysis

Powershell Ransomware – a PowerWare Deep Dive

Malware authors are always looking for an edge to evade detection and extend the useful life of their creations. In the constant cat-and-mouse game between malware authors and security vendors, malware authors must constantly revise and reinvent their product. They will consider anything they can do to avoid detection. Along these lines, Microsoft PowerShell has […]

READ MORE

Website designed and developed by Raincastle Communications, Inc.

X