
Bloated Binaries | How to Detect and Analyze Large macOS Malware Files
Massive malware binaries are becoming more common on macOS and can cause problems for detection and analysis. Here's how we can successfully deal with them.
Read More
Massive malware binaries are becoming more common on macOS and can cause problems for detection and analysis. Here's how we can successfully deal with them.
Learn how to drive radare2 with r2pipe for automated binary analysis, string decryption and other common reversing tasks.
Learn how to customize radare2 with user-defined aliases, macros and functions for faster and easier binary diffing and analysis.
ChatGPT has captured the imagination of many across infosec. Here's how it can superpower the efforts of reversers and malware analysts.
Learn how threat actors manipulate Windows to install malicious apps that are trusted by the system, and how to defend against them.
Visualizing data is integral to threat research. See how we used this timeline analysis tool to track activity in the Ukrainian cyber conflict.
Two high-severity flaws in popular end user security tools allow attackers to elevate privileges and compromise devices.
A must-read for fuzzing fans, this post gives a detailed look at the advanced techniques used in our recent discovery of multiple bugs in Defender for IoT.
As if IoT & OT aren't hard enough to defend, we dive into five critical vulnerabilities in Microsoft Defender for IoT that leave the door wide open.
In the next part of our series on reversing macOS malware, we dig into identifying reused code across malware samples for hunting and detection.