Native Java Bytecode Debugging without Source Code
At CrowdStrike, we’ve seen a moderate increase in Java-based malware recently, with Remote Access Tools (RATs) like Adwind becoming increasingly prevalent. Reverse…
At CrowdStrike, we’ve seen a moderate increase in Java-based malware recently, with Remote Access Tools (RATs) like Adwind becoming increasingly prevalent. Reverse…
Many of CrowdStrike’s customers are often targeted by email phishing campaigns and strategic web compromises (also known as watering-hole attacks). These attacks…
To look back one year in the life of technology is a long time, so 16 years could be considered almost an…
Background Today, most malware is obfuscated to make it more difficult for traditional antivirus engines to detect the malicious code and…
Last week, Morgan Marquis-Boire and Bill Marczak from The Citizen Lab published a fascinating glance at real-world mobile espionage tool created by…
Background As is commonly known in the industry, and as evident from recent high-profile malware samples such as Stuxnet and Flame, malicious…