VMRay's Solutions Engineer Ben Abbott talks about how organizations can access fast, early detection, that is resistant to evasion techniques, and works hand-in-hand with existing security infrastructure.
Watch Sr. Threat Researcher, Tamas Boczan talk in-depth of the analysis of recent Ursnif variants that enabled a case study. It will answer questions about open-source malware which would otherwise be subject to speculation.
Today, threat actors are developing malware to exploit the major shortcomings in traditional sandbox technology. With an agentless, hypervisor-based monitoring approach, VMRay provides security teams with a truly evasion resistant solution by seeing every threat without being seen.
Watch the VMRay team take a deeper look at the techniques malware authors use to evade automated dynamic analysis, and what steps can be taken for organizations to restore hope in their defenses.
VMRay's Sr. Threat Researcher Tamas Boczan & SANS Analyst, Jake Williams, dissect the techniques used to execute kernel-mode code and bypass existing OS security controls.
Watch the VMRay team take a deeper look at the techniques malware authors use to evade automated dynamic analysis, and what steps can be taken for organizations to restore hope in their defenses.
Manual interaction allows incident response teams to scrutinize suspect files, URLs, and snippets of code that have either raised a cautionary flag or completely evaded detection by automated methods. In manual mode, analysts can directly interact with suspicious samples.
In this analysis, the VMRay Labs Team examines the behavior of Rhino Ransomware (first identified in April 2020). This sample was found by Twitter user @GrujaRS on May 4th.