Threat Research

Mining for Malicious Ruby Gems
Typosquatting barrage on RubyGems software repository users

Hawkish applications lurking in your MacOS environment
macOS Blog 4 of 5: Catching the Proton Backdoor in your Video

Unpacking the Kwampirs RAT
Exposing Attack Campaigns, Hunting Threats and Delivering Actionable Threat Intelligence

Exposing Ryuk Variants Using YARA
Getting Ahead of Ryuk attacks using YARA Rules - Continued

Sneaky Tools Infiltrating Your Mac Fortress
macOS Blog 3 of 5: Potentially Unwanted Apps Masquerade as Well Behaved Applications D

Reminiscence of the Flashback
macOS Blog 2 of 5: Mac Flashback malware remains relevant

Is Your macOS Safe from Attack - What 2019 has Shown Us
macOS Blog 1 of 5: Treat macOS like any other potentially vulnerable asset

When Malware RATs on their Owners
Uncovering configurations for malicious Remote Administration Tools

The Hunt for NTCrypt: Exposing a Malicious Packer
Researchers demonstrate how threat hunting with Titanium Platform accelerates their analysis

Going Behind the Scenes of Cybercrime Group FIN6’s Attack On Retail and Hospitality
See how ReversingLabs delivers the actionable insights needed for threat hunters to find attacks related to a FIN6 reverse shell

Breaking the UEFI firmware Authenticode security model
Blog 8 in series: Digital Certificates - Models for Trust and Targets for Misuse

Breaking the Windows Authenticode security model
Blog 7 in series: Digital Certificates - Models for Trust and Targets for Misuse


