Malware September 4, 2015 An Example of Common String and Payload Obfuscation Techniques in Malware 9 min read - IBM X-Force researcher Igor Aronov examines some common techniques used by malware authors to complicate dynamic (automated) and static (manual) analysis.
X-Force July 23, 2015 An Analysis of the Qadars Banking Trojan 26 min read - This blog provides a deep, technical look into the Qadars banking Trojan.
X-Force October 20, 2014 Analysis of FinFisher Bootkit 9 min read - The following is an in-depth investigation of the FinFisher bootkit malware published by WikiLeaks and a breakdown of its technicalities.