Back to blog

Posts in the category
"Research"

Research

Analysis of a malicious email

Over the past few months we have seen that the waves of malspam are becoming increasingly sophisticated. A new modus...

Research

Cybersecurity: 4 trends to watch in 2018

With the increasing number of zero-day loopholes and the proliferation of source code (NSA Leaks), we are witnessing a...

Research

Analysis of the wave of PetrWrap/NoPetya/GoldenEye attacks

As of Wednesday June 28, the IT systems of many companies worldwide have been infected by a wave of ransomware...

Research

Jaff and Wannacry Ransomware Analysis

Since Thursday, May 11, the media has been preoccupied by an unprecedented series of cyber attacks that have crippled...

Research

NSA Malware: Leaked Code Leaves Millions Vulnerable

In mid-April hacker group, The Shadow Brokers released a package of confidential NSA documents including computer codes...

Research

Locky Ransomware: Back in Action with a New Delivery Method

Locky ransomware was one of the most popular malware programs throughout 2016. 7 out of 10 malicious emails delivered...

Research

Word Document Malware: OLE Exploited in Zero-Day Attack

A recently discovered Microsoft Office vulnerability has allowed a new type of Word document malware to infiltrate PCs.