Blog - Intezer

Blog

Cybersecurity DNA

Intezer Analyze Use Case: Visibility Among Global SOCs

Mapping the Connections Inside Russia's APT Ecosystem

Russian Cybercrime Group FullofDeep Behind QNAPCrypt Ransomware Campaigns

Why we Should be Paying More Attention to Linux Threats

MoP - "Master of Puppets" - Advanced malware tracking framework revealed at BlackHat Arsenal 2019.

Intezer Analyze Community: GonnaCry, HawkEye, BXAQ and More

Siemplify and Intezer: Incorporate Genetic Malware Analysis into your SOAR Platform (Video)

Intezer Analyze Community: Mapping Code Connections Between Malware Samples

Watching the WatchBog: New BlueKeep Scanner and Linux Exploits

EvilGnome: Rare Malware Spying on Linux Desktop Users

How We Seized 15 Active Ransomware Campaigns Targeting Linux File Storage Servers

Intezer Analyze Community: BlackSquid, RobbinHood Ransomware and More

Intezer and IBM Resilient Integrate to Enrich Threat Investigations with Genetic Malware Analysis

HiddenWasp and the Emergence of Linux-based Threats

Executable and Linkable Format 101 Part 4: Dynamic Linking

Genetic Malware Analysis Use Cases: Government Agencies

Chinese APTs Rising: Key Takeaways from the Intezer Analyze Community in May

HiddenWasp Malware Stings Targeted Linux Systems

A Straw-by-Straw Analysis: The Zero-Trust Approach for your Alert Haystack

Technical Analysis: Pacha Group Competing against Rocke Group for Cryptocurrency Mining Foothold on the Cloud

War on the Cloud: Cybercriminals Competing for Cryptocurrency Mining Foothold

Top Five Community Uploads | April 2019

Genetic Malware Analysis Use Cases: Financial Services

Meet the Team: Shaul Holtzman

Scan the Memory of Entire Endpoints using Genetic Malware Analysis

Top Five Community Uploads | March 2019

Technical Analysis: Pacha Group Deploying Undetected Cryptojacking Campaigns on Linux Servers

Pacha Group, A New Threat Actor Deploying Undetected Cryptojacking Campaigns on Linux Servers

Top Five Community Uploads | February 2019

New! API for the Intezer Analyze Community

What is Genetic Malware Analysis?

ChinaZ Revelations: Revealing ChinaZ Relationships with other Chinese Threat Actor Groups

Verifying Code Reuse Between Ursnif and 'Brexit' Malware Campaign Targeting the United Kingdom

Making Malware Human: A SANS Product Review of Intezer Analyze™

Muhstik Botnet Reloaded: New Variants Targeting phpMyAdmin Servers

The Researchers' View: Insights from Leading Global Security Researchers

Paleontology: The Unknown Origins of Lazarus Malware

APT37: Final1stspy Reaping the FreeMilk

Intezer Analyze™ ELF Support Release: Hakai Variant Case Study

Prince of Persia: The Sands of Foudre

Code, Strings and what’s in between

Examining Code Reuse Reveals Undiscovered Links Among North Korea’s Malware Families

Mitigating Emotet, The Most Common Banking Trojan

Product Updates

MirageFox: APT15 Resurfaces With New Tools Based On Old Ones

Digital Certificates- When the Chain of Trust is Broken

Iron Cybercrime Group Under The Scope

Executable and Linkable Format 101 Part 3: Relocations

NEW: Intezer Compromise Assessment Service

Unpacking reveals a file’s true DNA

Lazarus Group Targets More Cryptocurrency Exchanges and FinTech Companies

Building Your Bullet Proof Incident Response Plan

2018 Winter Cyber Olympics: Code Similarities with Cyber Attacks in Pyeongchang

Yet Another Distraction? A New Version of North Korean Ransomware Hermes Has Emerged

Executable and Linkable Format 101. Part 2: Symbols

Executable and Linkable Format 101 - Part 1 Sections and Segments

BLOCKBUSTED: Lazarus, Blockbuster, and North Korea

Don’t Be Fooled By Malware Signed with Stolen Certificates - How Intezer Analyze™ Detects Major Breaches in Security

Intezer Analyze™ FREE community edition

IcedID Banking Trojan Shares Code with Pony 2.0 Trojan

Silence of the Moles

NotPetya Returns as Bad Rabbit

Cyber Threat Diversion: Managing the False Positive Madness

Meet the Founders: Alon Cohen

North Korea and Iran Use CodeProject to Develop Their Malware

Evidence Aurora Operation Still Active Part 2: More Ties Uncovered Between CCleaner Hack & Chinese Hackers

Evidence Aurora Operation Still Active: Supply Chain Attack Through CCleaner

Intezer Community Tip: How to Optimize ssdeep Comparisons with ElasticSearch

New Variants of Agent.BTZ/ComRAT Found: The Threat That Hit The Pentagon In 2008 Still Evolving; Part 2/2

About the Founders: Meet Itai Tevet

Why Identifying ‘Good or Bad’ is Not Enough

GDPR: How to Bring Your Incident Response Plan Up to Speed

New Variants of Agent.BTZ/ComRAT Found: The Threat That Hit The Pentagon In 2008 Still Evolving; Part 1/2

“EternalMiner” Copycats exploiting SambaCry for cryptocurrency mining

Without a Trace: The Dangers of Fileless Malware

Introducing Cybersecurity DNA: the Intezer Company Blog

How to Defend Against IRONGATE-like malware?

© Intezer.com 2019 All rights reserved