[SANS Webcast] When Malware Source Code Leaks: Challenges & Solutions for Tracking New Variants

[SANS Webcast] When Malware Source Code Leaks: Challenges & Solutions for Tracking New Variants

Watch this SANS Webcast on the challenges of tracking malware families after the source code leaks. Learn how to identify the subtle differences between malware variants.
[Cyber Risk Alliance] Defense Against the Dark Arts: How Ransomware Evades Detection

[Cyber Risk Alliance] Defense Against the Dark Arts: How Ransomware Evades Detection

VMRay's Solutions Engineer Ben Abbott talks about how organizations can access fast, early detection, that is resistant to evasion techniques, and works hand-in-hand with existing security infrastructure.
[FIRST Conference Webcast] The Nightmare of Tracking Open-Source Malware: Five Years of Ursnif

[FIRST Conference Webcast] The Nightmare of Tracking Open-Source Malware: Five Years of Ursnif

Watch Sr. Threat Researcher, Tamas Boczan talk in-depth of the analysis of recent Ursnif variants that enabled a case study. It will answer questions about open-source malware which would otherwise be subject to speculation.
[SANS Lunch & Learn Webcast] Defense Against the Dark Arts: Dissecting Sandbox Evasion Techniques

[SANS Lunch & Learn Webcast] Defense Against the Dark Arts: Dissecting Sandbox Evasion Techniques

Watch the VMRay team take a deeper look at the techniques malware authors use to evade automated dynamic analysis, and what steps can be taken for organizations to restore hope in their defenses.
[SANS Webcast] Power! Unlimited Power! Understanding the Techniques of Malicious Kernel-Mode Code

[SANS Webcast] Power! Unlimited Power! Understanding the Techniques of Malicious Kernel-Mode Code

VMRay's Sr. Threat Researcher Tamas Boczan & SANS Analyst, Jake Williams, dissect the techniques used to execute kernel-mode code and bypass existing OS security controls.
[SANS Webcast] Defense Against the Dark Arts: Dissecting Sandbox Evasion Techniques

[SANS Webcast] Defense Against the Dark Arts: Dissecting Sandbox Evasion Techniques

Watch the VMRay team take a deeper look at the techniques malware authors use to evade automated dynamic analysis, and what steps can be taken for organizations to restore hope in their defenses.
[SANS Webcast] Dissecting Living off the Land Techniques

[SANS Webcast] Dissecting Living off the Land Techniques

Watch SANS Analyst, Jake Williams and Sr. Threat Analyst Tamas Boczan dissect living off the land techniques.
[SANS Webcast] Practical Malware Family Identification for Incident Responders

[SANS Webcast] Practical Malware Family Identification for Incident Responders

Learn practical malware family identification techniques from SANS Analyst, Jake Williams and Sr. Threat Analyst Tamas Boczan.
[SANS Webcast] Evade Me If You Can: Unmasking Context-Aware Malware

[SANS Webcast] Evade Me If You Can: Unmasking Context-Aware Malware

In this SANS Webcast, VMRay Solution Engineer Ben Abbott, Sr. Threat Researcher Tamas Boczan and SANS analyst Brandon McCrillis explore context-aware malware techniques.