
Is Your macOS Safe from Attack - What 2019 has Shown Us
macOS Blog 1 of 5: Treat macOS like any other potentially vulnerable asset
Read More about Is Your macOS Safe from Attack - What 2019 has Shown UsmacOS Blog 1 of 5: Treat macOS like any other potentially vulnerable asset
Read More about Is Your macOS Safe from Attack - What 2019 has Shown UsRemote Access Trojans Hide in Plain “Public” Site
Read More about RATs in the LibraryUncovering configurations for malicious Remote Administration Tools
Read More about When Malware RATs on their OwnersResearchers demonstrate how threat hunting with Titanium Platform accelerates their analysis
Read More about The Hunt for NTCrypt: Exposing a Malicious PackerSee how ReversingLabs delivers the actionable insights needed for threat hunters to find attacks related to a FIN6 reverse shell
Read More about Going Behind the Scenes of Cybercrime Group FIN6’s Attack On Retail and HospitalityBlog 8 in series: Digital Certificates - Models for Trust and Targets for Misuse
Read More about Breaking the UEFI firmware Authenticode security modelBlog 7 in series: Digital Certificates - Models for Trust and Targets for Misuse
Read More about Breaking the Windows Authenticode security modelBlog 9 in series: Digital Certificates - Models for Trust and Targets for Misuse
Read More about Breaking the Linux Authenticode security modelRocking the foundations of a trust-based digital code signing system
Read More about Breaking the Microsoft Authenticode security modelBlog 6: A new kind of certificate fraud: Executive impersonation
Read More about Digital Certificates - Models for Trust and Targets for Misuse 6Read More about Mirai Botnet Continues to Plague IoT Space
Blog 5 of 5 part series on advanced research into modern phishing attacks
Read More about The PDF invoice that phished youBlog 4 of 5 part series on advanced research into modern phishing attacks
Read More about Catching lateral movement in internal emailsBlog 3 of 5 part series on advanced research into modern phishing attacks
Read More about Ransomware in exotic email attachmentsBlog 2 of 5 part series on advanced research into modern phishing attacks
Read More about Catching deceptive links before the phishGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial