Entries filed under 'Malware Analysis'
Watering Holes and Malvertising: Uncovering the Root Cause of Compromise (Part 1)
As part of our normal course of operations as a cyber threat intelligence provider, we monitor the <a href="http://www.isightpartners.com/products/threatscape/cyber-crime/" style="font-size: 12px; line-height: 1.538;">cyber crime</a><span style="font-size: 12px; line-height: 1.538;"> underground and the world of </span><a href="http://www.isightpartners.com/products/threatscape/cyber-espionage/" style="font-size: 12px; line-height: 1.538;">cyber espionage</a><span style="font-size: 12px; line-height: 1.538;">. We provide analysis to our clients on new and emerging threats as well as help them analyze artifacts found on their networks. As you can imagine, we naturally run into large quantities of malware on a daily basis, conduct a great deal of reverse engineering and aide from time to time in incident response. Every once in awhile, we try to share details on what we find and how we find it to the public in the interest of informing the community around new threats and providing actionable analysis to support the hunt and kill missions.</span>