Threat Research

When Malware RATs on their Owners
Uncovering configurations for malicious Remote Administration Tools

The Hunt for NTCrypt: Exposing a Malicious Packer
Researchers demonstrate how threat hunting with Titanium Platform accelerates their analysis

Going Behind the Scenes of Cybercrime Group FIN6’s Attack On Retail and Hospitality
See how ReversingLabs delivers the actionable insights needed for threat hunters to find attacks related to a FIN6 reverse shell

Breaking the UEFI firmware Authenticode security model
Blog 8 in series: Digital Certificates - Models for Trust and Targets for Misuse

Breaking the Windows Authenticode security model
Blog 7 in series: Digital Certificates - Models for Trust and Targets for Misuse

Breaking the Linux Authenticode security model
Blog 9 in series: Digital Certificates - Models for Trust and Targets for Misuse

Breaking the Microsoft Authenticode security model
Rocking the foundations of a trust-based digital code signing system

Digital Certificates - Models for Trust and Targets for Misuse 6
Blog 6: A new kind of certificate fraud: Executive impersonation

The PDF invoice that phished you
Blog 5 of 5 part series on advanced research into modern phishing attacks

Catching lateral movement in internal emails
Blog 4 of 5 part series on advanced research into modern phishing attacks

Ransomware in exotic email attachments
Blog 3 of 5 part series on advanced research into modern phishing attacks

Catching deceptive links before the phish
Blog 2 of 5 part series on advanced research into modern phishing attacks

How to Prioritize High-Risk Phishing Attacks You Otherwise Miss

