Research
Blog
Incident Response
Security Planning and Assessment
How to Combat Extortion in the Digital World
May 4, 2017
Threat Analysis
Wire Wire: A West African Cyber Threat
August 4, 2016
Negative Feedback - Attack on a YouTube Channel
September 3, 2015
Cryptocurrency-Stealing Malware Landscape
February 26, 2014
Secrets of the Comfoo Masters
July 31, 2013
HTran and the Advanced Persistent Threat
August 3, 2011
Here You Have Worm and E-Jihad Connection
November 18, 2010
Operation Aurora: Clues in the Code
January 19, 2010
Virut Encryption Analysis
June 23, 2009