Все публикации

Nov 24: YARA rules for Amadey stealer

Nov 24: YARA rules for Phorpiex

Nov 24: YARA rules for Latrodectus, RATs, and TrickBot

Nov 24: VTI for detecting encoded asascript on macOS

Nov 24: VTI for detecting cleaning of Windows event logs

Nov 24: VTI for detecting self-deleting malware

Nov 24: VTI for detecting Process Doppelgäanging

Nov 24: Analyzing XWorm - Demo

Nov 24: Analyzing AsyncRAT - Demo

Nov 24: Analyzing Lumma stealer - Demo

Bridging the Gap: Infostealer Intelligence for the Analytical CTI Teams | VMRay & @vtxproject

Year-End Detection Highlights: New Threat Insights to Close 2024

Real Techniques to Stress-Test Your Malware Sandbox | No Slides, Just Demos | Full Webinar

URP Workshop: Getting Started with VMRay’s Phishing Analysis

VMRay & ServiceNow Configuration | Step-by Step Tutorial

VMRay ServiceNow Integration | Step-by Step Tutorial

On-prem or/and Cloud for security deployment

Zero trust, incident response and the SOC

Visibility analytics and advanced malware analysis

Balancing platforms and best-of-breed security solutions

How to get from reactive to proactive security

How to empower security teams to be proactive

Why analyst experience matters - and how to improve it

3 pillars of implementing Zero Turst