Nickolas BakerMar 16, 20233 min readMalicious eFax Attachments Can Potentially Steal Your Microsoft O365 PasswordPhishing attack observed by Polito, Inc., which uses an obfuscated JavaScript attachment to show how to analyze the malicious attack.
Wade MaMar 3, 20209 min readAutomated Obfuscation of Windows Malware and Exploits Using O-LLVMToday’s malware authors and exploit developers have automated methods of obfuscating their software, When these techniques are combined with
Fred MastrippolitoJun 18, 20192 min readThe CISO asked me to run Ransomware on his laptopThe executive’s laptop had the very latest version of a cloud-based, next-generation antivirus endpoint detection and response software, whi
Liana ParakesyanFeb 21, 20194 min readUsing Intezer Analyze to Reveal Malware Ancestry and Assist IR and Forensic InvestigationsToday, much of the malware still operates via the same concept of infecting machines and spreading throughout networks. Due to this, it only
Ian DuffyNov 14, 20174 min readUnpacking script2exe MalwareScript2exe functions by packaging the original VBScript as an encrypted resource within a PE stub. The original script is retained in the EX