Blog - Intezer

Blog

Cybersecurity DNA

Making Malware Human: A SANS Product Review of Intezer Analyze™

Muhstik Botnet Reloaded: New Variants Targeting phpMyAdmin Servers

The Researcher View: Insights from Leading Global Security Researchers

Paleontology: The Unknown Origins of Lazarus Malware

APT37: Final1stspy Reaping the FreeMilk

Intezer Analyze™ ELF Support Release: Hakai Variant Case Study

Prince of Persia: The Sands of Foudre

Code, Strings and what’s in between

Examining Code Reuse Reveals Undiscovered Links Among North Korea’s Malware Families

Mitigating Emotet, The Most Common Banking Trojan

Product Updates

MirageFox: APT15 Resurfaces With New Tools Based On Old Ones

Digital Certificates- When the Chain of Trust is Broken

Iron Cybercrime Group Under The Scope

Executable and Linkable Format 101 Part 3: Relocations

NEW: Intezer Compromise Assessment Service

Unpacking reveals a file’s true DNA

Lazarus Group Targets More Cryptocurrency Exchanges and FinTech Companies

Building Your Bullet Proof Incident Response Plan

2018 Winter Cyber Olympics: Code Similarities with Cyber Attacks in Pyeongchang

Yet Another Distraction? A New Version of North Korean Ransomware Hermes Has Emerged

Executable and Linkable Format 101. Part 2: Symbols

Executable and Linkable Format 101 - Part 1 Sections and Segments

BLOCKBUSTED: Lazarus, Blockbuster, and North Korea

Don’t Be Fooled By Malware Signed with Stolen Certificates - How Intezer Analyze™ Detects Major Breaches in Security

Intezer Analyze™ FREE community edition

IcedID Banking Trojan Shares Code with Pony 2.0 Trojan

Silence of the Moles

NotPetya Returns as Bad Rabbit

Cyber Threat Diversion: Managing the False Positive Madness

Meet the Founders: Alon Cohen

North Korea and Iran Use CodeProject to Develop Their Malware

Evidence Aurora Operation Still Active Part 2: More Ties Uncovered Between CCleaner Hack & Chinese Hackers

Evidence Aurora Operation Still Active: Supply Chain Attack Through CCleaner

Intezer Community Tip: How to Optimize ssdeep Comparisons with ElasticSearch

New Variants of Agent.BTZ/ComRAT Found: The Threat That Hit The Pentagon In 2008 Still Evolving; Part 2/2

About the Founders: Meet Itai Tevet

Why Identifying ‘Good or Bad’ is Not Enough

GDPR: How to Bring Your Incident Response Plan Up to Speed

New Variants of Agent.BTZ/ComRAT Found: The Threat That Hit The Pentagon In 2008 Still Evolving; Part 1/2

“EternalMiner” Copycats exploiting SambaCry for cryptocurrency mining

Without a Trace: The Dangers of Fileless Malware

Introducing Cybersecurity DNA: the Intezer Company Blog

How to Defend Against IRONGATE-like malware?

© Intezer.com 2018 All rights reserved