+1.813.321.0987

InfoSec Articles (08/29/2022 – 09/12/2022)

Over the last two weeks, we saw the new BianLian ransomware gang, used subtle techniques to exploit, enumerate, and move laterally in victim networks to remain undetected and aggressively worked to counter Endpoint Detection & Response (EDR) protections during the...

Malware Hashes and Hash Functions

An Introduction to Malware Hashes and Hash Functions Malware hashes are found everywhere in our industry. And for a good reason. They very efficiently help identify malware samples and standardize the exchange of information among researchers, to name a couple of use...

InfoSec Articles (08/01/2022 – 08/16/2022)

Over the last two weeks, SC Media shared the top three email-based threats, what they have in common and how you can protect your organization. Also, more details about the Maui ransomware that has been used against US healthcare operations has been linked to...