Recently we experimented with our generic unpacking heuristics. Our goal was to unpack a potentially malicious binary and dump the executable from memory to a file. During our experiments we saw a
Category: Security
Security
I’ve only heard this one a few times but since this myth was recently referenced in one of the comments of the post, "TOGAF Demystification Series: TOGAF Sucks, Incomplete and Overly Com
Today @Dana_Gardner posted on twitter The Open Group Panel discussion on Big Data’s Big Impact on Enterprise IT. It worth a watch as it gave a good primer on general concerns in the industry.
Recently we have seen a spike in a Visual Basic 6-compiled AutoRun worm family. The family is both client- and server-side polymorphic. (For more on this family, refer to our VIL and Advisory entri