Home Tags Research

Tag: Research

Happy IR in the New Year!

Endpoint anal In IR cases we use a very simple script that is uploaded to every Windows computer in the corporate network to collect logs, NTFS data, entries from the Windows registry and strings from the binary files to find out how exactly the attackers were moving through the network.
Itrsquo;s holiday season and it is our pleasure to share this script with you.
Empirical research reveals three big problems with how patents are vetted.
When one NGO blocked intrusion, frustrated hackers tried to knock its website offline.
Forensic examiners don't work for bounties.

They do what is required to catch criminals, pedophiles, or corporate embezzlers, and now their important security research is finally being acknowledged.
Artificial intelligence can generate fresh patterns in data with astonishing speed, efficiency, and verisimilitude. Over the past few years, it has become commonplace for AI to algorithmically generate any object that can be rendered digitally.Incre...
In an earlier publication we noted that cybercriminals were making use of social engineering to install this sort of software on usersrsquo; computers.

This time, wersquo;d like to dwell more on how exactly the computers of gullible users start working for cybercriminals.
Lack of automation capabilities syphon significant time, decreasing the value of CRM software investments LONDON, December 19 2017 – New research from NewVoiceMedia, a leading global provider of cloud contact centre and inside sales technology, r...
At the end of September, Palo Alto released a report on Unit42 activity where they – among other things – talked about PYLOT malware. We have been detecting attacks that have employed the use of this backdoor since at least 2015 and refer to it as Travle.

Coincidentally, KL was recently involved in an investigation of a successful attack where Travle was detected, during which we conducted a deep analysis of this malware.
These sea-level rise scenarios arenrsquo;t new, but they are food for thought.
Therersquo;s still no solid evidence that cell phones pose any risk.
The forerunner of the F-117 Stealth Fighter flew for the first time 40 years ago this month.
Commercial installations didn't slow, but there's a lot of uncertainty in the market.