Malware – Ransomware

Malware Analysis, Part 1: Understanding Code Obfuscation Techniques

In a preceding article, we conducted a study on a malicious email and noted that code could be executed when attachments were opened. Today we will focus on these malicious codes that are executed. We will come to understand what they are doing and what techniques are used to complicate the work of analysts and to bypass protections.

Artificial intelligence takes over to effectively protect emails and the enterprise

Artificial Intelligence to the rescue of emails, following more and more sophisticated attacks the protection tools of your email must evolve. How the AI ​​further improves the protection of your email.

Subscribe to our monthly newsletter for our latest posts