top of page
Search
Roman Romanenco
Jan 13, 20178 min read
Prepare for Ransomware: Delivery and Defense (Part 3 in a Series on Ransomware)
*This blog entry was originally published on January 13, 2017 on the original Polito Blog by Roman Romanenco . It was re-posted on...
Roman Romanenco
Aug 19, 20165 min read
Deconstructing the Ransomware Kill Chain (Part 2 in a Series on Ransomware)
*This blog entry was originally published on August 19, 2016 on the original Polito Blog by Roman Romanenco . It was re-posted on October...
Roman Romanenco
Jul 18, 20165 min read
The Proliferation of Ransomware (Part 1 in a Series on Ransomware)
*This blog entry was originally published on July 18, 2016 on the original Polito Blog by Roman Romanenco . It was re-posted on October...
Ian Duffy
Mar 15, 20164 min read
Language Interpreters and Post-Exploitation
*This blog entry was originally published on March 15, 2016 on the original Polito Blog by Ian Duffy . It was re-posted on October 3,...
Ian Duffy
Jan 29, 20162 min read
BurpSuite Yara Plugin
*This blog entry was originally published on January 29, 2016 on the original Polito Blog by Ian Duffy . It was re-posted on October 3,...
Polito, Inc.
Jan 28, 20167 min read
The Simplicity of VBA Malware (Part 2 of 2)
*This blog entry was originally published on January 28, 2016 on the original Polito Blog. It was re-posted on October 3, 2017 due to...
Polito, Inc.
Jan 4, 20165 min read
The Simplicity of VBA Malware (Part 1 of 2)
*This blog entry was originally published on January 4, 2016 on the original Polito Blog. It was re-posted on October 3, 2017 due to...
Ian Duffy
May 24, 20155 min read
Analysis and Modification of Android Apps
*This blog entry was originally published on May 24, 2015 on the original Polito Blog by Ian Duffy . It was re-posted on October 3, 2017...
Fred Mastrippolito
Apr 6, 20152 min read
Antivirus … for Linux
What antivirus is best? That's a question that everyone seems to be asking these days. Antivirus is a useful tool for detecting known ma
Ian Duffy
Mar 31, 20158 min read
Analysis of a Romanian Botnet
*This blog entry was originally published on April 1, 2015 on the original Polito Blog by Ian Duffy . It was re-posted on October 3, 2017...
Ian Duffy
Mar 23, 20153 min read
Running Metasploit Shellcode in a Process
*This blog entry was originally published on March 23, 2015 on the original Polito Blog by Ian Duffy . It was re-posted on October 2,...
bottom of page