September 3, 2015


Cognitive Research: Learning Detectors of Malicious Network Traffic

9 min read

This post was authored by Karel Bartos, Vojtech Franc, & Michal Sofka. Malware is constantly evolving and changing. One way to identify malware is by analyzing the...

August 8, 2015


Research Spotlight: Detecting Algorithmically Generated Domains

4 min read

This post was authored by Mahdi Namazifar and Yuxi Pan Once a piece of malware has been successfully installed on a vulnerable system one of the first orders of business is for the malware to reach out to the remote command-and-control (C&C) servers in order to receive further instructions, updates and/or to exfiltrate valuable user […]

March 30, 2015


Threat Spotlight: Dyre/Dyreza: An Analysis to Discover the DGA

12 min read

This post was authored by Alex Chiu & Angel Villegas. Overview Banking and sensitive financial information is a highly coveted target for attackers because of the high value and obvious financial implications.  In the past year, a large amount of attention has been centered on Point of Sale (PoS) malware due to its major role in […]