Threat Research

PoorWeb - Hitching a Ride on Hangul
Tearing Down HWP Files To Expose a Trojan

Taidoor - a truly persistent threat
When malware lasts longer than your washing machine

Five Uses of YARA
YARA is a useful member of the toolset of researchers, threat hunters, incident responder, and many other defenders.

Hidden Cobra - from a shed skin to the viper’s nest
Enriching public threat intelligence

Mining for Malicious Ruby Gems
Typosquatting barrage on RubyGems software repository users

Hawkish applications lurking in your MacOS environment
macOS Blog 4 of 5: Catching the Proton Backdoor in your Video

Unpacking the Kwampirs RAT
Exposing Attack Campaigns, Hunting Threats and Delivering Actionable Threat Intelligence

Exposing Ryuk Variants Using YARA
Getting Ahead of Ryuk attacks using YARA Rules - Continued

Sneaky Tools Infiltrating Your Mac Fortress
macOS Blog 3 of 5: Potentially Unwanted Apps Masquerade as Well Behaved Applications D

Reminiscence of the Flashback
macOS Blog 2 of 5: Mac Flashback malware remains relevant

Is Your macOS Safe from Attack - What 2019 has Shown Us
macOS Blog 1 of 5: Treat macOS like any other potentially vulnerable asset



