Office Docs, The Macro View

Attackers often use Office Macros as a means to infect computers and download additional malicious code. In this post I'll explore the ways an attacker can use macros to download more content and we'll walk through some sample code.
Read More

Strings Strings Everywhere

Although it is not common for malware samples to contain clear text strings, it does happen, and it is an easy place to start analysis. Strings can be embedded in malware samples and provide indications to what the malware will do when executed. (Estimated Reading Time, 11 minutes)
Read More

Exploring APT Actors

The term APT is used to refer mainly to Nation States but more recently can also include well funded organized crime groups conducting large scale intrusions. In this blog post we are going to look at the list of APT Groups published by Mitre. (Estimated Reading Time, 6 minutes)
Read More