Latest Articles

Expert Perspectives

New wave of PlugX targets Hong Kong

New wave of PlugX targets Hong Kong

Mustang Panda APT is using PlugX payload to spy on targets, and steal documents in air-gaped networks via USB.

2 weeks ago 7 min read
Research

The evolution of Mirai into HolyMirai

The evolution of Mirai into HolyMirai

We present a study of the core similarities, differences, and evolution of the original Mirai and its new variant, HolyMirai.

3 weeks ago 6 min read
Research

Capesand. The revival of exploit kits.

Capesand. The revival of exploit kits.

In this blog we are taking a brief look at the background of exploit kits, but mainly focusing on reversing NJcrypt which is a loader for njRAT.

1 month ago 7 min read
Threat Intelligence

The need for an industrial-scale cloud sandbox

The need for an industrial-scale cloud sandbox

A cloud sandbox often has limited performance, scalability, a high price-tag and comes with serious concerns over data privacy. Unless built on an AWS platform.

5 months ago 4 min read

We think you will find interesting

Anti-Malware

The value of independent anti-virus testing

The value of independent anti-virus testing

Unlike many other tests in the IT industry, independent anti-virus (AV)  testing is really just that: Independent. But how to interpret the results?

1 year ago 5 min read
Machine Learning

Applying AI: getting underneath machine learning

Applying AI: getting underneath machine learning

Machine learning (or artificial intelligence) is a must-have for scaling malware detection. But what type of machine learning should you look for, and how should it be applied?

2 years ago 3 min read