
Platform Technology Updates: Better Malware Detection for Multiple Image Formats with TitaniumCore
Learn more about our revised image modules

PoorWeb - Hitching a Ride on Hangul
Tearing Down HWP Files To Expose a Trojan

Taidoor - a truly persistent threat
When malware lasts longer than your washing machine

Five Uses of YARA
YARA is a useful member of the toolset of researchers, threat hunters, incident responder, and many other defenders.

Hidden Cobra - from a shed skin to the viper’s nest
Enriching public threat intelligence

Modern Architectures Require New Security Strategies for Digital Assets
Monitoring your Security DMZ and Securing your File Uploads

Introducing explainable threat intelligence
Meet the next-generation of threat detection and hunting algorithms that are built for humans.

Mining for Malicious Ruby Gems
Typosquatting barrage on RubyGems software repository users

Hawkish applications lurking in your MacOS environment
macOS Blog 4 of 5: Catching the Proton Backdoor in your Video

Unpacking the Kwampirs RAT
Exposing Attack Campaigns, Hunting Threats and Delivering Actionable Threat Intelligence




