2024-11-13 |
What Are Threat Intelligence Feeds? A Guide to Proactive Cyber Defense |
Uncategorized ‧ Lynn Zhou |
|
2024-11-11 |
The role of advanced malware analysis in government cybersecurity |
Cyber Security ‧ Fatih Cam |
|
2024-11-07 |
Detection Highlights – October 2024: Detecting self-deleting malware using ADS, event log evasion, and upgraded YARA rules |
detection updates ‧ Fatih Cam |
|
2024-11-05 |
Game On: How Threat Intel and Sandboxing are the Ultimate Co-op |
Cyber Security ‧ Fatih Cam |
|
2024-10-21 |
Latrodectus: A year in the making |
Malware Analysis ‧ Fatih Cam |
|
2024-10-04 |
Detection Highlights – September 2024: Config Extractor for Latrodectus, Detecting Disablement of Windows Defender & Security Center Notifications, and PhishKit |
detection updates ‧ Fatih Cam |
|
2024-09-25 |
Advantage Attacker: EDR Bypass Tools | Scarecrow |
Cyber Security ‧ Fatih Cam |
|
2024-09-11 |
Why Best-in-Class Security Solutions Outmatch Product Suites |
Cyber Security ‧ Fatih Cam |
|
2024-09-09 |
Detection Highlights – August 2024: Bash Reverse Shells VTI Detections, Enhanced Phishing SLDs, and 4 New YARA Rules |
detection updates ‧ Fatih Cam |
|
2024-08-30 |
Release Highlights: VMRay Platform 2024.4.0 |
release highlights ‧ Fatih Cam |
|
2024-08-20 |
Latrodectus updates to version 1.4 with AES-256 string encryption |
Unknown Threats ‧ Fatih Cam |
|
2024-08-08 |
Detection Highlights – July 2024: Tackling Malicious Windows Activities and Advancing YARA Rules |
detection updates ‧ Fatih Cam |
|
2024-08-05 |
Malware goes undetected by hiding malicious code in uncommon MS Access format |
Unknown Threats ‧ Fatih Cam |
|
2024-07-19 |
Why “good enough” could kill your business |
Featured Posts ‧ Fatih Cam |
|
2024-07-18 |
AgentTesla delivered via exploiting Microsoft Office |
Unknown Threats ‧ Fatih Cam |
|
2024-07-18 |
Malware executes its payload ONLY WHEN THE SCREEN IS LOCKED. |
Unknown Threats ‧ Fatih Cam |
|
2024-07-05 |
Malicious batch file reveals its full behavior ONLY WHEN IT WAS STARTED BY A DOUBLE-CLICK |
Unknown Threats ‧ Fatih Cam |
|
2024-07-05 |
Detection Highlights – June 2024: Detecting Windows Defender Tampering and YARA rule for EDR Silencer |
detection updates ‧ Fatih Cam |
|
2024-07-04 |
Obfuscated batch file downloads open-source stealer straight from GitHub |
Unknown Threats ‧ Fatih Cam |
|
2024-06-11 |
Detection Highlights – May 2024: Identifying Multi-Step Attacks and Evasive Malware |
detection updates ‧ Fatih Cam |
|
2024-06-10 |
VMRay at Locked Shields 2024: Enhancing Cyber Resilience through Collaboration |
Events and News ‧ Fatih Cam |
|
2024-06-06 |
Release Highlights: VMRay Platform 2024.3.0 |
detection updates ‧ Fatih Cam |
|
2024-05-21 |
“Good Enough” Sandbox Technology is Not Enough: The Risks of Evasive Malware & Choosing the Right Solution |
Cyber Security ‧ Fatih Cam |
|
2024-05-08 |
Implications of Pareto’s Principle: Why relying on a single platform security approach fails |
CISO Insights ‧ Fatih Cam |
|
2024-05-08 |
Unveiling AI Menaces & Ransomware Tactics: Detection Highlights – April 2024 |
detection updates ‧ Fatih Cam |
|
2024-04-30 |
Malware Sandbox Evasion Techniques: All You Need to Know |
Cyber Security ‧ Lynn Zhou |
|
2024-04-29 |
Sandbox Evasion Techniques |
Cyber Security ‧ Lynn Zhou |
|
2024-04-27 |
Sandbox Evasion Techniques – Part 1 |
Cyber Security ‧ Lynn Zhou |
|
2024-04-26 |
Guarding the Gates: The Growing Abundance of Linux Malware |
Cyber Security ‧ Fatih Cam |
|
2024-04-23 |
How VMRay’s User Reported Phishing Works |
Cyber Security ‧ Fatih Cam |
|
2024-04-23 |
What Organizations Can Do to Mitigate Phishing Email Bypass |
Cyber Security ‧ Fatih Cam |
|
2024-04-23 |
Making the Case for User Reported Phishing |
Cyber Security ‧ Fatih Cam |
|
2024-04-09 |
Signature and Detection Highlights – March 2024 |
detection updates ‧ Fatih Cam |
|
2024-04-09 |
Feature Highlight 2024.2: Exchanging intelligence with STIX 2.1 |
Product Features ‧ Fatih Cam |
|
2024-04-06 |
Signature and Detection Highlights – February 2024 |
detection updates ‧ vmraywebsite@gmail.com |
|
2024-04-06 |
Healthcare Under Ransomware Attacks – Part 3: Rhysida |
Cyber Security ‧ vmraywebsite@gmail.com |
|
2024-04-06 |
Healthcare Under Ransomware Attacks – Part 2: LockBit |
Cyber Security ‧ vmraywebsite@gmail.com |
|
2024-04-06 |
Healthcare Under Ransomware Attacks – Part 1: BlackCat/AlphV |
Cyber Security ‧ vmraywebsite@gmail.com |
|
2024-04-06 |
VMRay Platform 2024.2.0 Release Highlights |
Product Features ‧ vmraywebsite@gmail.com |
|
2024-04-06 |
i-Soon or Later: Exposing the sandbox secrets of cyber espionage |
Cyber Security ‧ Bedi |
|
2024-04-06 |
Just Carry A Ladder: – Why Your EDR Let Pikabot Jump Through |
Malware Analysis ‧ Bedi |
|
2024-04-06 |
Latest from VMRay: Signature and detection highlights December 2023 & January 2024 |
detection updates ‧ Bedi |
|
2024-04-06 |
Living off the Land (LOTL): A Typhoon of Covert Threats |
Cyber Security ‧ Lynn Zhou |
|
2024-04-06 |
Latest from VMRay: Signature and detection highlights December 2023 & January 2024 |
detection updates ‧ Lynn Zhou |
|
2021-06-15 |
Malware Analysis Spotlight: SocialPhish (and its Anti-Social Use of Phishing Templates) |
Malware Analysis ‧ VMRay Labs Team |
|
2021-05-12 |
Threat Bulletin: Exploring the Differences and Similarities of Agent Tesla v2 & v3 |
Malware Analysis ‧ Mateusz Lukaszewski |
|
2021-05-05 |
Nonintrusive TLS Visibility: A Transparent Way to Inspect Traffic |
Product Features ‧ VMRay Labs Team |
|
2021-04-26 |
VMRay Platform v4.2.0 Release Highlights |
Featured Posts ‧ Uriel Cohen |
|
2021-03-25 |
Malware Classification Case Study: Raccoon Stealer |
Malware Analysis ‧ VMRay Labs Team |
|
2021-03-03 |
VMRay Signs U.S. Distribution Agreement With Ingram Micro |
Events and News ‧ Ilijana Vavan |
|
2021-02-23 |
[SANS Webcast Recap] When Malware Source Code Leaks: Challenges & Solutions for Tracking New Variants |
Malware Analysis ‧ VMRay Labs Team |
|
2021-02-17 |
VMRay Signs Distribution Agreement With Multipoint Group to Expand into Israeli Market |
Events and News ‧ Ilijana Vavan |
|
2021-02-05 |
Analyzing a DLL in a Sandbox: Speeding up Analysis of an APT Implant |
Malware Analysis ‧ VMRay Labs Team |
|
2021-01-20 |
VMRay and ELITE VAD Sign Distribution Agreement |
Events and News ‧ Ilijana Vavan |
|
2021-01-15 |
Malware Analysis Spotlight: OSAMiner Uses Run-Only AppleScripts to Evade Detection |
Malware Analysis ‧ Felix Seele |
|
2021-01-13 |
VMRay Appoints Marcus Conroy As New Vice President Of Sales, Americas |
Events and News ‧ Ilijana Vavan |
|
2020-12-22 |
VMRay Signs Agreement with Factor Group to Expand Into Russian Market |
Events and News ‧ Ilijana Vavan |
|
2020-12-16 |
Malware Analysis Spotlight – Hentai Oniichan Ransomware (Berserker Variant) |
Malware Analysis ‧ VMRay Labs Team |
|
2020-12-10 |
VMRay Closes $25 Million Series B |
Events and News ‧ Dr. Carsten Willems |
|
2020-12-08 |
VMRay Platform v4.1.0 Release Highlights |
Featured Posts ‧ Uriel Cohen |
|
2020-11-19 |
Malware Analysis Spotlight: AZORult Delivered by GuLoader |
Malware Analysis ‧ VMRay Labs Team |
|
2020-10-22 |
Malware Analysis Spotlight: Warzone RAT – Automatically Peeling Away the Layers |
Malware Analysis ‧ VMRay Labs Team |
|
2020-10-21 |
Malware Analysis Spotlight: Ave_Maria – Automatically Peeling Away the Layers |
Malware Analysis ‧ VMRay Labs Team |
|
2020-10-14 |
VMRay Signs European Distribution Agreement with Ingram Micro |
Events and News ‧ Ilijana Vavan |
|
2020-10-09 |
Explained: VMRay Verdict System |
Product Features ‧ Dave Greten |
|
2020-10-07 |
[SANS Webcast Recap] Power! Unlimited Power! Understanding the Techniques of Malicious Kernel-Mode Code |
Malware Analysis ‧ VMRay Labs Team |
|
2020-10-02 |
Malware Analysis Spotlight: Formbook (September 2020) |
Malware Analysis ‧ VMRay Labs Team |
|
2020-09-17 |
Malware Analysis Spotlight: Qbot’s Delivery Method |
Malware Analysis ‧ VMRay Labs Team |
|
2020-09-15 |
VMRay Signs Partnership with Sababa Security to Expand into Italian Cybersecurity Market |
Events and News ‧ Ilijana Vavan |
|
2020-09-09 |
VMRay Signs Partnership with Deepcase to Expand Into the Growing Turkish Cybersecurity Market |
Events and News ‧ Ilijana Vavan |
|
2020-09-08 |
VMRay Platform 4.0: Link Detonation, Smart Caching, Enhanced IOC Extraction, and more |
Product Features ‧ Dave Greten |
|
2020-09-03 |
VMRay Signs Technology Partnership With Anomali Featuring Free Daily Malware Reports To Customers |
Events and News ‧ Zac Kenney |
|
2020-08-27 |
VMRay Signs Distribution Agreement with RAH Infotech to Expand Reach In The Growing APAC Market |
Events and News ‧ Ilijana Vavan |
|
2020-08-26 |
Threat Bulletin: WastedLocker Ransomware |
Malware Analysis ‧ VMRay Labs Team |
|
2020-08-18 |
SANS Webcast Recap: Defense Against Dark Arts – Dissecting Sandbox Evasion Techniques |
Malware Analysis ‧ VMRay Labs Team |
|
2020-08-12 |
Malware Analysis Spotlight: MassLogger’s Noisy Stealing Attempts |
Malware Analysis ‧ VMRay Labs Team |
|
2020-07-24 |
Malware Analysis Spotlight: The Return of Emotet |
Malware Analysis ‧ VMRay Labs Team |
|
2020-07-22 |
Decoding the Verizon DBIR Report: An Insider’s Look Beyond the Headlines |
Cyber Security Trends ‧ Chad Loeven |
|
2020-07-09 |
Threat Bulletin: Dissecting GuLoader’s Evasion Techniques |
Featured Posts ‧ Pascal Brackmann |
|
2020-07-02 |
Threat Bulletin: Cutting-off the Command-and-Control Infrastructure of CollectorGoomba |
Malware Analysis ‧ John Faria |
|
2020-06-25 |
Indicators of Compromise (IOCs) and Artifacts: What’s the Difference? |
Product Features ‧ Dave Greten |
|
2020-06-19 |
Malware Analysis Spotlight: Phishing Site Spread through SMS |
Malware Analysis ‧ VMRay Labs Team |
|
2020-06-16 |
SANS Webcast Recap: Dissecting Living off the Land Techniques |
Malware Analysis ‧ Dave Greten |
|
2020-06-08 |
Threat Bulletin: RagnarLocker Ransomware |
Malware Analysis ‧ Mateusz Lukaszewski |
|
2020-06-04 |
VMRay & Anomali: Deliver Seamlessly Integrated Threat Analysis & Intelligence |
Connectors ‧ Dave Greten |
|
2020-05-28 |
Malware Analysis Spotlight: Paymen45 Ransomware |
Malware Analysis ‧ VMRay Labs Team |
|
2020-05-20 |
Investing in Cyber Security: Why It’s Important to Protect Your Company During a Pandemic |
Cyber Security ‧ Dr. Carsten Willems |
|
2020-05-14 |
Move Fast and Don’t Break Things (Part 2): Automated Malware De-obfuscation by Accurate API Monitoring |
Product Features ‧ Tamas Boczan |
|
2020-05-14 |
Malware Analysis Spotlight: Rhino Ransomware |
Malware Analysis ‧ VMRay Labs Team |
|
2020-05-07 |
Partner Q&A: Protecting Critical Healthcare Infrastructure from Disruption |
Cyber Security ‧ Dr. Carsten Willems |
|
2020-05-06 |
VMRay Forges Distribution Agreement With ectacom GmbH |
Events and News ‧ Ilijana Vavan |
|
2020-05-06 |
Where Your Data is Stored and Why It Matters |
Cyber Security ‧ Dave Greten |
|
2020-04-27 |
VMRay Platform Version 3.3 Highlights |
Product Features ‧ Uriel Cohen |
|
2020-04-23 |
Move Fast and Don’t Break Things (Part 1): Accurate API Monitoring at High Performance |
Product Features ‧ Tamas Boczan |
|
2020-04-20 |
VMRay Expands Executive Leadership Team to Fuel Next Stage of Growth |
Events and News ‧ Chad Loeven |
|
2020-04-10 |
Explained: The VMRay Threat Identifier (VTI) Scoring System |
Product Features ‧ Dave Greten |
|
2020-04-02 |
Good Apps Behaving Badly: Dissecting Zoom’s macOS Installer Workaround |
simonebrunozzi |
|
2020-04-02 |
Stepping Up to Help During the Crisis |
Events and News ‧ Dave Greten |
|
2020-03-27 |
Debunking The Four Most Common Fileless Attack Myths |
Cyber Security ‧ Chad Loeven |
|
2020-03-25 |
SANS Webcast Recap: Practical Malware Family Identification for Incident Responders |
Malware Analysis ‧ Ben Abbott |
|