Gil Hamer, Author at Intezer

Blog

Cybersecurity DNA

Executable and Linkable Format 101 Part 3: Relocations

NEW: Intezer Compromise Assessment Service

Unpacking reveals a file’s true DNA

Lazarus Group Targets More Cryptocurrency Exchanges and FinTech Companies

Building Your Bullet Proof Incident Response Plan

2018 Winter Cyber Olympics: Code Similarities with Cyber Attacks in Pyeongchang

Yet Another Distraction? A New Version of North Korean Ransomware Hermes Has Emerged

Executable and Linkable Format 101. Part 2: Symbols

Executable and Linkable Format 101 - Part 1 Sections and Segments

BLOCKBUSTED: Lazarus, Blockbuster, and North Korea

Don’t Be Fooled By Malware Signed with Stolen Certificates - How Intezer Analyze™ Detects Major Breaches in Security

Intezer Analyze™ FREE community edition

IcedID Banking Trojan Shares Code with Pony 2.0 Trojan

Silence of the Moles

NotPetya Returns as Bad Rabbit

Cyber Threat Diversion: Managing the False Positive Madness

Meet the Founders: Alon Cohen

North Korea and Iran Use CodeProject to Develop Their Malware

Evidence Aurora Operation Still Active Part 2: More Ties Uncovered Between CCleaner Hack & Chinese Hackers

Evidence Aurora Operation Still Active: Supply Chain Attack Through CCleaner

Intezer Community Tip: How to Optimize ssdeep Comparisons with ElasticSearch

New Variants of Agent.BTZ/ComRAT Found: The Threat That Hit The Pentagon In 2008 Still Evolving; Part 2/2

About the Founders: Meet Itai Tevet

Why Identifying ‘Good or Bad’ is Not Enough

GDPR: How to Bring Your Incident Response Plan Up to Speed

New Variants of Agent.BTZ/ComRAT Found: The Threat That Hit The Pentagon In 2008 Still Evolving; Part 1/2

“EternalMiner” Copycats exploiting SambaCry for cryptocurrency mining

Without a Trace: The Dangers of Fileless Malware

Introducing Cybersecurity DNA: the Intezer Company Blog

How to Defend Against IRONGATE-like malware?

© Intezer.com 2017 All rights reserved