top of page
Search


Nickolas Baker
Mar 16, 20233 min read
Malicious eFax Attachments Can Potentially Steal Your Microsoft O365 Password
Phishing attack observed by Polito, Inc., which uses an obfuscated JavaScript attachment to show how to analyze the malicious attack.

Wade Ma
Mar 3, 20209 min read
Automated Obfuscation of Windows Malware and Exploits Using O-LLVM
Today’s malware authors and exploit developers have automated methods of obfuscating their software, When these techniques are combined with

Fred Mastrippolito
Jun 18, 20192 min read
The CISO asked me to run Ransomware on his laptop
The executive’s laptop had the very latest version of a cloud-based, next-generation antivirus endpoint detection and response software, whi

Liana Parakesyan
Feb 21, 20194 min read
Using Intezer Analyze to Reveal Malware Ancestry and Assist IR and Forensic Investigations
Today, much of the malware still operates via the same concept of infecting machines and spreading throughout networks. Due to this, it only


Ian Duffy
Nov 14, 20174 min read
Unpacking script2exe Malware
Script2exe functions by packaging the original VBScript as an encrypted resource within a PE stub. The original script is retained in the EX
bottom of page