Securing the Cloud August 31, 2018 Serverless Security is more than FaaS Security – Part 1 In the process of onboarding large enterprises, Dome9 ingests massive cloud footprints and has to ...
Security August 31, 2018 Architect-ed for Automation: AWS Transit VPCs with Check Point CloudGuard There are a number of reasons why organizations are drawn to AWS for their public ...
Research August 30, 2018 Ransom Warrior Decryption Tool On August 8th, a new ransomware, dubbed ‘RansomWarrior’, was found by the Malware Hunter Team. Going ...
Security August 30, 2018 AI and Cybersecurity: combining data with human expertise Artificial intelligence continues to proliferate and influence our lives. Speech recognition and image recognition rely ...
Research August 28, 2018 CeidPageLock: A Chinese RootKit Research by: Israel Gubi Over the last few weeks, we have been observing a rootkit ...
Research August 26, 2018 Interactive Mapping of APT-C-23 Research by: Aseel Kayal Last month, we investigated the renewal of a targeted attack against ...
Security August 23, 2018 File-less Malware No Match For SandBlast Agent File-less malware attacks are on the rise. As a result, much has been written on ...
Research August 23, 2018 Labeless Part 3: How to Dump and Auto-Resolve WinAPI Calls in LockPos Point-of-Sale Malware In this part we show how to automatically resolve all WinAPI calls in malicious code ...
Research August 23, 2018 Labeless Part 2: Installation In this part we will be guiding you through the installation of Labeless. Post install ...
Research August 23, 2018 Labeless Part 1: An Introduction Labeless, a plugin for both IDA and popular debuggers, is an invaluable tool in the ...