Expert Perspectives

Expert Perspectives

New wave of PlugX targets Hong Kong

New wave of PlugX targets Hong Kong

Mustang Panda APT is using PlugX payload to spy on targets, and steal documents in air-gaped networks via USB.

2 weeks ago 7 min read
Research

Capesand. The revival of exploit kits.

Capesand. The revival of exploit kits.

In this blog we are taking a brief look at the background of exploit kits, but mainly focusing on reversing NJcrypt which is a loader for njRAT.

1 month ago 7 min read
Anti-Malware

The value of independent anti-virus testing

The value of independent anti-virus testing

Unlike many other tests in the IT industry, independent anti-virus (AV)  testing is really just that: Independent. But how to interpret the results?

1 year ago 5 min read
Machine Learning

Applying AI: weighing up Deep Learning

Applying AI: weighing up Deep Learning

This article is the second in our series looking at machine learning techniques. In the first, we explored supervised and unsupervised machine learning, how they differ and when to apply them. Here we consider what’s meant by Deep Learning and its application to cyber-security.

1 year ago 3 min read
Machine Learning

Applying AI: getting underneath machine learning

Applying AI: getting underneath machine learning

Machine learning (or artificial intelligence) is a must-have for scaling malware detection. But what type of machine learning should you look for, and how should it be applied?

2 years ago 3 min read