Watch this on-demand threat intelligence session exploring the latest infostealer malware evasion techniques, including Shark Stealer, EtherHiding, and branded CAPTCHA phishing. Learn about new detection logic, updated YARA rules, and real-world tactics like process hollowing and masquerading executables. Built for CTI, DFIR, and detection engineering teams.
Join this webinar to look at what makes a feed worth operationalizing—signals like first-seen timeliness, measurable uniqueness vs. public OSINT, and coverage of active malware families—without turning your pipeline into a firehose. Expect tips you can apply the same day. You’ll learn how to: Ingest VMRay UniqueSignal feed into MISP.
Catch up on the key insights from our November session, where we explored emerging infostealer trends, new VTIs from our Labs team, and what truly defines a high-value threat intelligence feed for modern detection workflows.
On October 22, 2025, Ertugrul and Patrick walked through this month’s detection updates and investigations — from Mac-focused malware like ChillyHell and AMOS to rising OAuth-based phishing techniques. Watch the on-demand webinar video to learn new VTIs, VM-evasion and legit-looking phishing detections, plus config-extractor and Smart Link Detonation improvements introduced
Watch the recording of Operational Threat Intel Wins with VMRay UniqueSignal × Filigran OpenCTI and see how top CTI and SOC teams turn malware intel into measurable outcomes. Learn how VMRay’s UniqueSignal feed integrates seamlessly with OpenCTI, empowering you to prioritize what matters, automate routing, and deliver actionable insights that
Watch the on-demand replay of our October 14th session, hosted by VMRay experts Uriel Cohen, Serge Haumont, and Andrey Voitenko to see how VMRay strengthens your Microsoft-powered SOC.In this demo-driven session, our experts showcase how seamless integrations with Microsoft Defender and Microsoft Sentinel reveal attacker behavior, enrich phishing and malware
Catch the replay of our September Detection Highlights webinar, where we covered the latest threat detection updates—from spotting stealthy batch file cleanup scripts and phishing pages with computer vision AI, to new config extractors for Vidar v14 and CryptBot. Learn how these capabilities strengthen defenses against infostealers, phishing kits, and
In this “Spotlight on Fingerprinting, Tofsee Configs & RansomHub-Linked Loaders” webinar, we walked through: Improved VTIs to detect registry queries, domain joins, and stealthy OS fingerprinting via LOLBins like systeminfo. New config extractors for Tofsee and SocGholish/FakeUpdates, often linked to RansomHub. New YARA rules for stealers, loaders, and RATs seen
In this “New Detections in Focus: Prometei, Formbook, SVG Smuggling and more” webinar, we walked through: New VTIs for fake credit card forms, SVG smuggling, Linux service creation, and new netsh syntax in Windows firewall modifications New Config Extractors for Formbook, Masslogger, and Prometei bot 20+ YARA Rules, including detections
Discover how today’s phishing threats continue to bypass traditional defenses — and what your security team can do about it. In this exclusive SANS Ransomware Summit session, learn how to combine AI-powered automation with human insight to analyze and neutralize advanced email-based threats. ✔ Access the full recording✔ Download the
Keep up to date with our weekly digest of articles. Get the latest news, invites to events, and threat alerts!
🚀 Meet UniqueSignal: empower your security operations with precise and actionable threat intelligence!