
Code Reuse Across Packers and DLL Loaders
One of the core tenets of computer science is code reuse.
Read More about Code Reuse Across Packers and DLL LoadersOne of the core tenets of computer science is code reuse.
Read More about Code Reuse Across Packers and DLL LoadersMany families of remote access trojan (RAT) are .NET executables.
Read More about DotNET LoadersRead More about Malware in images: When you can’t see 'the whole picture'
How to Rebuild Trust in the SDLC and 3rd Party Software Supply Chain
Read More about CISO’s Guide to Protecting Against Modern Software RisksThe SunBurst supply chain attack, which was behind the breach of SolarWinds, took sophistication and patience.
Read More about The attack on SolarWinds: Next-level stealth was keyWelcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.
Read More about The Week in Security: Wiper malware rains down on 2022, Microsoft certificates abusedReversingLabs and Sophos partner to bring high-quality threat intelligence to security practitioners and data scientists
Read More about Advancing the Cybersecurity Industry with the SOREL-20M InitiativeLearn more about our revised image modules
Read More about Platform Technology Updates: Better Malware Detection for Multiple Image Formats with TitaniumCoreTearing Down HWP Files To Expose a Trojan
Read More about PoorWeb - Hitching a Ride on HangulWhen malware lasts longer than your washing machine
Read More about Taidoor - a truly persistent threatExplainability. Transparency. Relevancy.
Read More about Machine Learning for HumansYARA is a useful member of the toolset of researchers, threat hunters, incident responder, and many other defenders.
Read More about Five Uses of YARAGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial