To help cyber defenders automate workflows at scale, the Cybersecurity and Infrastructure Security Agency (CISA) has announced its launch of a new file analysis platform. Named Thorium, the platform ...
The landscape of malware analysis has significantly evolved, driven by the increasing sophistication of cyber threats and the advanced techniques being developed to combat them. Malware attacks on US ...
Corelight, a provider of network detection and response (NDR) solutions, delivers static file analysis capabilities powered by YARA integration, an open-source tool used to scan files and data streams ...
As cybercriminals use Artificial Intelligence (AI) to boost the scale and sophistication of malware attacks, Justin Grosfelt, Manager of the Reversing, Emulation, and Testing (RET) Team, Insikt Group, ...
Ever since the early days of computers, cybercriminals have been creating malware to compromise the internal systems and files of electronic devices. This insidious threat often goes unnoticed unless ...
Jan Miller is a serial entrepreneur and the founder and lead developer of multiple cybersecurity startups, all focusing on developing cutting-edge automated malware analysis systems, both static and ...
Cybersecurity researchers have published a new analysis of the elusive Gigabud banking malware. Originating as an Android Remote Access Trojan (RAT), Gigabud was first observed in September 2022, ...
Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine ...