
RATs in the Library
Remote Access Trojans Hide in Plain “Public” Site
Read More about RATs in the LibraryRemote Access Trojans Hide in Plain “Public” Site
Read More about RATs in the LibraryGetting Ahead of Ryuk attacks using YARA rules
Read More about Hunting for RansomwareUncovering configurations for malicious Remote Administration Tools
Read More about When Malware RATs on their OwnersResearchers demonstrate how threat hunting with Titanium Platform accelerates their analysis
Read More about The Hunt for NTCrypt: Exposing a Malicious PackerSee how ReversingLabs delivers the actionable insights needed for threat hunters to find attacks related to a FIN6 reverse shell
Read More about Going Behind the Scenes of Cybercrime Group FIN6’s Attack On Retail and HospitalityScaling Cybersecurity: How ReversingLabs Analyzed 10 Billion Files to Combat Emerging Threats
Read More about 10 Billion Files ClassifiedRead More about 3 Ways High-Priority Malware Detection Can Fill SOC Gaps
Blog 8 in series: Digital Certificates - Models for Trust and Targets for Misuse
Read More about Breaking the UEFI firmware Authenticode security modelBlog 7 in series: Digital Certificates - Models for Trust and Targets for Misuse
Read More about Breaking the Windows Authenticode security modelBlog 9 in series: Digital Certificates - Models for Trust and Targets for Misuse
Read More about Breaking the Linux Authenticode security modelRocking the foundations of a trust-based digital code signing system
Read More about Breaking the Microsoft Authenticode security modelEnterprise software development graduated from the “waterfall” framework of development and operations - and became less linear, more complex and, in several ways, more difficult to secure. And while contemporary software supply chain practices allow developers to manage that complexity and deliver software efficiently at scale, unaddressed gaps and vulnerabilities within the process continue to be exploited by threat actors.
Read More about Why You Need to Prioritize Software Development and Supply Chain SecurityRead More about How to Detect Software Supply Chain Attacks
Read More about Going Beyond Files: Destructive Object Analysis
Blog 6: A new kind of certificate fraud: Executive impersonation
Read More about Digital Certificates - Models for Trust and Targets for Misuse 6Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial