Observing COM within Malicious Code

How malware leverages the Component Object Model

Read more

Using Good Code for Bad Things

See how malware takes good code and makes it bad.

Read more

How to Unpack a Self-Injecting Citadel Trojan

A ‘how-to’ guide on unveiling the Citadel Trojan’s code.

Read more

A Look at Malware with Virtual Machine Detection

What you can do against malware with Virtual Machine detection.

Read more

Process Explorer Now Including VirusTotal Support

The popular Process Explorer program from Sysinternals now includes VirusTotal support.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language