post Internet of Broken Things: Threats are changing, so are we ?Security UncategorizedSeptember 20, 2016January 9, 2019
post Recovering Files From Brand New Crypt0l0ckerreverse engineering Security UncategorizedMarch 22, 2016January 9, 2019
post Ransomware: a general view after field experiencesreverse engineering Security UncategorizedFebruary 16, 2016January 9, 2019
post Shifu: A new interesting Banking TrojanAttack Security UncategorizedSeptember 3, 2015January 9, 2019
post PDF Versions Malicious Content DistributionAttack Security UncategorizedDecember 23, 2014January 9, 2019
post ReGeneration (Regin) Targeted AttackAttack Security UncategorizedNovember 28, 2014January 9, 2019
post Nice Way To Evade Dynamic AnalysisAttack Security UncategorizedSeptember 10, 2014January 9, 2019