Malware – Ransomware

Malware analysis: understanding code obfuscation techniques

In a preceding article, we conducted a study on a malicious email and noted that code could be executed when attachments were opened. Today we will focus on these malicious codes that are executed. We will come to understand what they are doing and what techniques are used to complicate the work of analysts and to bypass protections.

Best ransomware protection software

When it comes to ransomware, be very afraid. Vade Secure’s ransomware protection software helps IT managers breathe a little easier with its AI-backed defenses against ransomware, spear fishing and zero-day attacks.

Analysis of the wave of PetrWrap/NoPetya/GoldenEye attacks

As of Wednesday June 28, the IT systems of many companies worldwide have been infected by a wave of ransomware identified in the press under the names "PetrWrap", "NoPetya" and "GoldenEye". Ukraine, Russia, Denmark, the UK, Norway and the Netherlands in particular have been affected by the ransomware. According to initial analyses, 60% of the [...]

Subscribe to our newsletter

Recent tweets on @vadesecure