Nothing else is working. Why not memory forensics?
I ran across a couple of blog posts recently that were espousing the virtues of memory forensics. Having developed a framework very…
I ran across a couple of blog posts recently that were espousing the virtues of memory forensics. Having developed a framework very…
Often during the investigation of sophisticated threat actors, the demarcation between the different attackers and campaigns are blurry. Researchers need to rely…
According to a recent Harvard Business Review report, 84 percent of enterprises have increased their Cloud usage in the past year. Fueling…
As malware and its authors continue to evolve, deciphering the purpose of specific malware-driven attacks has become more challenging. While some malware…
In the wake of the Hacking Team leaks in early July, a result of an intrusion into the company’s network, various zero-day…
As the increasingly aggressive rhetoric surrounding the conflict in the South China Sea (SCS) continues to dominate both Western and Chinese media…
Recently, I discovered a vulnerability in QEMU's virtual Floppy Disk Controller (FDC), exploitation of which may allow malicious code inside a virtual…
In 2014 it became abundantly clear that threat intelligence provides a decisive advantage in protecting your enterprise. Using threat intelligence, savvy security…
George Kurtz, Dmitri Alperovitch and Elia Zaitsev have just finished up the Hacking Exposed: Beyond the Malware session at the RSA 2015 Conference. In…
“I’m drowning in data, but starving for information.” Ever feel that way? Recently, I heard a CISO use this as a description…