(Editor’s Note: this blog originally appeared on RedCanary.com)
Over the last 5 years I have grown very close to Splunk. The product has evolved so much over the year...
Learn MoreOn February 14, 2020 the U.S. Department of Homeland Security (DHS) released a Malware Analysis Report (MAR-10271944-1.v1) which provided information about a trojan they referred ...
Learn MoreMalware comes in all shapes, sizes, and languages to make defending against attacks more difficult. One of the nefarious ways malware attempts to hide is by masquerading as a legi...
Learn MoreThis past weekend I received one of the most dreaded messages a SecOps member can get: “I think someone is trying to get into my account.”
I immediately ran over to my lapto...
In my previous blog, I explained Bitcoin mining and provided an overview of a new type of malware used by malicious Bitcoin miners. In today’s post, I take a closer look at a spec...
Learn MoreMany customers have recently asked how Carbon Black’s solutions detect macros and droppers (specifically referencing Emotet dropper files). Customers often say that macros a...
Learn MoreA Microsoft Word document (.doc) believed to be malicious was recently submitted to Carbon Black’s Threat Analysis Unit (TAU). The submitting organization did not feel that that d...
Learn MoreThere has been a lot of coverage about the malware known as Destover.
Several hashes have been released by US-CERT, the FBI and other organizations. This blog examines how y...