BreakingNews PUP, Study of an aggressive rootkit
PUPs (for potentially unwanted programs) are harmless by design, most of the time. Here we will study a case where such program behaves like a rootkit.
DetailsPUPs (for potentially unwanted programs) are harmless by design, most of the time. Here we will study a case where such program behaves like a rootkit.
DetailsCarberp Anti Rapport Trusteer – How the Carberp malware is defeating Anti Rapport (from Trusteer) to gain access to the bank account of a victim.
DetailsAnalysis of the Carberp bootkit capabilities to hide into the system, and self protect its components with a filter driver.
DetailsExploits and Exploit kits play a major role in the spread of malware. Learn how they work and how to protect yourself from such threats.
DetailsDiscover exploitation methods, exploits development and inner workings and learn about the countermeasures that exists to protect your infrastructure.
DetailsDiscover the inner working of the places where transactions between exploits dealers take place and the conditions of such transactions.
DetailsYou’ve all seen Facebook posts shared by your friends with attractive titles, waiting for you to click. We’ve clicked for you, and you will be deceived.
DetailsFileless malware has always been popular and widely covered (Example: Poweliks). Study of a fileless malware stored in the task scheduler.
Details