Malware Research Institute


Complex Incident Response Investigations: How to Minimise Breach Impactby Rafe Pilling, Senior Security Researcher, Dell SecureWorks

How prepared are you for a data breach? With the threat environment growing more complex, and the rise in advanced...

Read More

Reverse Engineering Mac Malwareby Sarah Edwards

Dynamic malware reverse engineering helps forensic analysts and reverse engineers gather quick data points such as callout domains, file download...

Read More

APTs: Getting Serious About Zero-Day Threatsby Alex Lanstein

Cyber security remains the #1 priority for IT security executives and practitioners in 2012 for good reason. With cyber-attacks on...

Read More

Extracting Actionable Cyber Intelligence from a RAT Named Poison Ivyby Darien Kindlund, Tom Bennett, Ned Moran and Nart Villeneuve

Poison Ivy is older than the iPhone, Windows Vista, the Nintendo Wii, and Twitter, yet it remains one of the...

Read More

Illbuster - fighting illegal contentby A.Kozakiewicz, J.Urbanowicz, I.Corona

The talk was presented on October 23, 2014 at SECURE 2014 - an IT security conference organized by NASK and...

Read More
Load More…