Back to blog

Posts written
by Thomas Gendron

Malware - Ransomware

Malware Analysis, Part 2: Deobfuscating Code in a Word Macro

In part 1, we defined what code obfuscation is, what it could be used for, and we studied some code with a small amount...

Malware - Ransomware

Malware Analysis, Part 1: Understanding Code Obfuscation Techniques

In a preceding article, we conducted a study on a malicious email and noted that code could be executed when...

Research

Analysis of a malicious email

Over the past few months we have seen that the waves of malspam are becoming increasingly sophisticated. A new modus...