<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Black Hat 2016: An Overload of Senses from Culinary Excess to a Tsunami of Cyber Events

Posted by Lennart van den Ende on Aug 16, 2016

Las Vegas has a tendency to overload all of your senses. Similarly Black Hat, too, has the effect of inducing information overload on nearly every participant.

Read More

Tags: trends, malware, threats, sandbox, isolation, phishing, black hat, security, cybersecurity

Rombertik - Rise of Self Aware Malware

Posted by Kowsik Guruswamy on May 5, 2015

Cisco Threat Blog recently published information on the Rombertik Malware which takes a fair number of steps to evade sandboxes (not exactly rocket science), but goes even further to disrupt reverse engineering and analysis by malware experts. Fundamentally the Rombertik malware follows the well trodden exploitation life cycle:

Read More

Tags: malware, cybersecurity, blog, sandbox

Microsoft Phishing Emails Are Taking The Red Pill

Posted by Kowsik Guruswamy on Feb 13, 2015

According to researchers at Cisco, the Chanitor dropper malware is targeting enterprises via Phishing emails that purport to come from Microsoft Volume Licensing Center (MVLC). Interestingly the Chanitor is using Red Pill techniques to actively figure out if it's running inside of a sandbox and lies dormant up to 30 minutes before making active connections out to the Internet. Some interesting observations about Chanitor:

Read More

Tags: malware, phishing, sandbox

Connect with us

Lists by Topic

see all

Recent Posts

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.