Malware September 4, 2015 An Example of Common String and Payload Obfuscation Techniques in Malware 9 min read - IBM X-Force researcher Igor Aronov examines some common techniques used by malware authors to complicate dynamic (automated) and static (manual) analysis.
Threat Research July 23, 2015 An Analysis of the Qadars Banking Trojan 26 min read - This blog provides a deep, technical look into the Qadars banking Trojan.
Threat Research October 20, 2014 Analysis of FinFisher Bootkit 9 min read - The following is an in-depth investigation of the FinFisher bootkit malware published by WikiLeaks and a breakdown of its technicalities.