Ioan Iacob - Lulian Madalin Ionita
The Anatomy of Wiper Malware, Part 1: Common Techniques
This is the first blog post in a four-part series. Read Part 2 | Part 3 | Part 4. This blog post is the first in a four-part series in which CrowdStrike’s Endpoint Protection Content Research Team wil[…]