Ransomware and Spyware Top Intezer Analyze Community Detections
Hey there! Let’s dive into some exciting community highlights for this month, covering a range of file formats like APK, ELF, and PE. 1) Anubis – Anubis is a sneaky […]
Hey there! Let’s dive into some exciting community highlights for this month, covering a range of file formats like APK, ELF, and PE. 1) Anubis – Anubis is a sneaky […]
Enhance your file investigations with the latest string reuse capabilities in Intezer Analyze Intezer Analyze users can now take advantage of the enhanced string features within the platform. These advanced […]
When it comes to analyzing malware, the main goal is to not only identify the type of malware but also understand its behavior when executed on a system. This can […]
Research conducted by Intezer and Checkmarx has revealed a new type of software supply chain attack called ChainJacking, which poses a risk to common admin tools. Vulnerable open-source Go packages […]
When suspicious activity is detected on an endpoint, the incident response team is tasked with investigating to determine the cause of the potential security breach. Is it a rapidly spreading […]
Financial services are a prime target for cyber attackers, and it’s no surprise why – they follow the money. Working in this sector involves handling funds, sensitive data, and personal […]
When you find yourself reverse engineering code as part of an incident response team, your main goal is to quickly gather information about the type of threat you are facing. […]
October 2023 Update: Intezer analyzes all URLs that we collect as evidence for automated alert triage, which now includes detecting and extracting QR codes for phishing email investigations. At Intezer, […]
Threat actors have a variety of tools and techniques at their disposal for cyber attacks, including malware-as-a-service, open-source tools, red team or admin tools. There are also legitimate tools that […]
Analyzing suspicious URLs on an individual basis can be tricky, but when you’re facing a large volume of potentially malicious URLs then other approaches that leverage automation (like machine learning) […]