Our Research

Working together to improve global computer security.

Research Articles

Below are the articles our research team has published on various cybersecurity topics.
Signed Binary Proxy Execution
Hackers are creative with disguising their malware...
Virtualization/Sandbox Evasion
Must know technical details for malware analysis...
OS Credential Dumping Technique
Secure your credentials before threat actors get their hands on them ....
Scheduled Task/Job Technique
Monitoring your scheduled tasks may reveal unusual patterns...
Obfuscated Files or Information
Technique
Entropy of a file does matter...
System Information Discovery Technique
Knowledge is power, particularly in network security...