On October 29 we published our third CrackMe Challenge and announced two parallel tracks for the contest: “The fastest solve” ,…
Tag: reverse engineering
ProxyLogon PoCs trigger a game of whack-a-mole
As we reported recently, the use of the Microsoft Exchange Server ProxyLogon vulnerabilities has gone from “limited and targeted attacks” to…
5 tips for building an effective security operations center (SOC)
Security is more than just tools and processes. It is also the people that develop and operate security systems. Creating systems…
Hidden Bee: Let’s go down the rabbit hole
Some time ago, we discussed the interesting malware, Hidden Bee. It is a Chinese miner, composed of userland components, as well…
Reversing malware in a custom format: Hidden Bee elements
Malware can be made of many components. Often, we encounter macros and scripts that work as malicious downloaders. Some functionalities can…