qadars

In our recent blog post Blinding Malware Analysis with COM Objects we talked about the steady trend of malware using Microsoft s Component Object Model COM for evading sandbox analysis The reason why COM can be used to perform stealth operations is that traditional dynamic analysis systems monitor program behavior

Uncover the truth of Cybersecurity, one story at a time

Keep up to date with our weekly digest of articles. Get the latest news, invites to events, and threat alerts!

Subscribe to our Newsletter