Logo Logo Logo Logo Logo
  • stormshield.com
  • stormshield.com
28 August, 2018 in ThisIsSecurity
A walk through the AcridRain Stealer
29 March, 2018 in ThisIsSecurity
In-depth Formbook malware analysis – Obfuscation and process injection
20 March, 2018 in ThisIsSecurity
De-obfuscating Jump Chains with Binary Ninja
02 March, 2018 in ThisIsSecurity
Spot the Agent
12 January, 2018 in ThisIsSecurity
Analyzing an Agent Tesla campaign: from a word document to the attacker credentials
19 October, 2017 in ThisIsSecurity
Attacking a co-hosted VM: A hacker, a hammer and two memory modules
28 September, 2017 in ThisIsSecurity
Analyzing a form-grabber malware
28 October, 2016 in ThisIsSecurity
Octopus-Rex. Evolution of a multi task Botnet
19 October, 2016 in ThisIsSecurity
How to run userland code from the kernel on Windows – Version 2.0
16 September, 2016 in ThisIsSecurity
The macabre dance of memory chunks
  • 1
  • 2
logo
  • stormshield.com
  • Legal Notice
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok