29 March, 2018 in ThisIsSecurity In-depth Formbook malware analysis – Obfuscation and process injection
12 January, 2018 in ThisIsSecurity Analyzing an Agent Tesla campaign: from a word document to the attacker credentials
19 October, 2017 in ThisIsSecurity Attacking a co-hosted VM: A hacker, a hammer and two memory modules