#gdatatechblog arama sonuçları

🔍New Blog: JustAskJacky -- AI brings back classical trojan horse malware 🔗gdatasoftware.com/blog/2025/08/3… #GDATA @GDATA #GDATATechblog


How to use knowledge about .NET structures and streams for writing better .NET Yara signatures. E.g. IL code patterns, method signature definitions, GUIDs, compressed length. #100DaysOfYara #GDATATechblog @GDATA #GDATA gdatasoftware.com/blog/2025/04/3…

struppigel's tweet image. How to use knowledge about .NET structures and streams for writing better .NET Yara signatures.   

E.g. IL code patterns, method signature definitions, GUIDs, compressed length.

#100DaysOfYara #GDATATechblog @GDATA #GDATA
gdatasoftware.com/blog/2025/04/3…

Blog post: "PE trick explained: Telling 32 and 64 bit apart with naked eye" 👀 🦔 (based on question by @living_pirate) gdatasoftware.com/blog/pebitness… #GDATATechblog #GDATA @GDATA #PETrick #PEBitness

struppigel's tweet image. Blog post: "PE trick explained: Telling 32 and 64 bit apart with naked eye" 👀 🦔
(based on question by @living_pirate)

gdatasoftware.com/blog/pebitness…
#GDATATechblog #GDATA @GDATA #PETrick #PEBitness

Some threat actors are bold enough to submit their malware as false positive to antivirus companies. This also happened with AppSuite PDF Editor. Our technical deep-dive is out 📝 gdatasoftware.com/blog/2025/08/3… #GDATA #GDATATechblog #AppSuite


Ever wanted to know how malware names are created and why they are such a mess? I wrote an article about it. #MalwareNames #GDATATechblog @GDATA gdatasoftware.com/blog/malware-f…


New blog article: Sandbox scores are not an antivirus replacement #GDATATechblog @GDATA gdatasoftware.com/blog/2024/09/3…


New Blog: Deobfuscating BBTok loader, ConfuserEx variant with dnlib, Python and PowerShell by @marius_benthin and me #GDATATechblog #GDATA @GDATA #BBTok gdatasoftware.com/blog/2024/09/3…


#RisePro stealer targets Github users in "gitgub" campaign #GDATATechblog gdatasoftware.com/blog/2024/03/3…


A colleague and me wrote an article about EvilConwi -- signed ConnectWise remote access software being abused as malware @GDATA #GDATATechblog gdatasoftware.com/blog/2025/06/3…


Steam game BlockBlasters downloads malware written by Arvin Tan #GDATATechblog @GDATA #GDATA gdatasoftware.com/blog/2025/09/3…


New article: "The real reason why malware detection is hard—and underestimated" If you think an AI with a 98% malware detection rate and 1% false positive rate is splendid, this might change your mind. #GDATATechblog @GDATA gdatasoftware.com/blog/2022/06/3…


New article: Hashing for (malware) samples. 🦔#⃣ Including icon hashes, call graph hashes, human readable hash, rich header hash, import hashes ... #GDATATechblog @GDATA #hashing #hash #malware gdatasoftware.com/blog/2021/09/a…


Blog: Printer company provided infected printer software for half a year. ➡️ XRed backdoor ➡️ SnipVex virus Initially reported by Youtuber of "Serial Hobbyism" #GDATATechblog #GDATA @GDATA gdatasoftware.com/blog/2025/05/3…


New article: T-RAT 2.0, malware control via smartphone 📱☣️🦔 Thanks to @3xp0rtblog @GDATA #GDATATechblog #TRAT #GDATA gdatasoftware.com/blog/trat-cont…


New article: Analysis of JPHP (PHP for Java VM) malware named IceRat. ➡️ how to deobfuscate JPHP ➡️ IceRat IOCs #GDATATechblog @GDATA #JPHP gdatasoftware.com/blog/icerat-ev…


Steam game BlockBlasters downloads malware written by Arvin Tan #GDATATechblog @GDATA #GDATA gdatasoftware.com/blog/2025/09/3…


Some threat actors are bold enough to submit their malware as false positive to antivirus companies. This also happened with AppSuite PDF Editor. Our technical deep-dive is out 📝 gdatasoftware.com/blog/2025/08/3… #GDATA #GDATATechblog #AppSuite


🔍New Blog: JustAskJacky -- AI brings back classical trojan horse malware 🔗gdatasoftware.com/blog/2025/08/3… #GDATA @GDATA #GDATATechblog


A colleague and me wrote an article about EvilConwi -- signed ConnectWise remote access software being abused as malware @GDATA #GDATATechblog gdatasoftware.com/blog/2025/06/3…


Blog: Printer company provided infected printer software for half a year. ➡️ XRed backdoor ➡️ SnipVex virus Initially reported by Youtuber of "Serial Hobbyism" #GDATATechblog #GDATA @GDATA gdatasoftware.com/blog/2025/05/3…


How to use knowledge about .NET structures and streams for writing better .NET Yara signatures. E.g. IL code patterns, method signature definitions, GUIDs, compressed length. #100DaysOfYara #GDATATechblog @GDATA #GDATA gdatasoftware.com/blog/2025/04/3…

struppigel's tweet image. How to use knowledge about .NET structures and streams for writing better .NET Yara signatures.   

E.g. IL code patterns, method signature definitions, GUIDs, compressed length.

#100DaysOfYara #GDATATechblog @GDATA #GDATA
gdatasoftware.com/blog/2025/04/3…

Karsten Hahn and I took a closer look at the latest #BBTok .NET loaders. In my first article on the #GDATATechblog we describe how to deobfuscate Trammy.dll and share new details about the BBTok infection chain. gdatasoftware.com/blog/2024/09/3… @struppigel @GDATA #GDATA


New Blog: Deobfuscating BBTok loader, ConfuserEx variant with dnlib, Python and PowerShell by @marius_benthin and me #GDATATechblog #GDATA @GDATA #BBTok gdatasoftware.com/blog/2024/09/3…


New blog article: Sandbox scores are not an antivirus replacement #GDATATechblog @GDATA gdatasoftware.com/blog/2024/09/3…


Opinion: More layers in malware campaigns are not a sign of sophistication #GDATATechblog @GDATA gdatasoftware.com/blog/2024/08/3…


My colleague wrote about #Ailurophile stealer. It puts stolen files and its own malicious PHP scripts into a virtual file system. #GDATATechblog @GDATA gdatasoftware.com/blog/2024/08/3…


#RisePro stealer targets Github users in "gitgub" campaign #GDATATechblog gdatasoftware.com/blog/2024/03/3…


New article: "The real reason why malware detection is hard—and underestimated" If you think an AI with a 98% malware detection rate and 1% false positive rate is splendid, this might change your mind. #GDATATechblog @GDATA gdatasoftware.com/blog/2022/06/3…


New article: Allcome clipbanker analysis and config extraction ➡️first seen reported by @3xp0rtblog #Allcome #clipbanker #GDATATechblog @GDATA gdatasoftware.com/blog/2022/02/3…


New article: Hashing for (malware) samples. 🦔#⃣ Including icon hashes, call graph hashes, human readable hash, rich header hash, import hashes ... #GDATATechblog @GDATA #hashing #hash #malware gdatasoftware.com/blog/2021/09/a…


"#gdatatechblog" için sonuç bulunamadı

"Paliz, the PowerShell downloader in a ZIP and beyond" My first article for #GDataTechblog. Starting with something small. 😁 gdatasoftware.com/blog/2019/04/3…

struppigel's tweet image. "Paliz, the PowerShell downloader in a ZIP and beyond"

My first article for #GDataTechblog.
Starting with something small. 😁

gdatasoftware.com/blog/2019/04/3…

Blog post: "PE trick explained: Telling 32 and 64 bit apart with naked eye" 👀 🦔 (based on question by @living_pirate) gdatasoftware.com/blog/pebitness… #GDATATechblog #GDATA @GDATA #PETrick #PEBitness

struppigel's tweet image. Blog post: "PE trick explained: Telling 32 and 64 bit apart with naked eye" 👀 🦔
(based on question by @living_pirate)

gdatasoftware.com/blog/pebitness…
#GDATATechblog #GDATA @GDATA #PETrick #PEBitness

How to use knowledge about .NET structures and streams for writing better .NET Yara signatures. E.g. IL code patterns, method signature definitions, GUIDs, compressed length. #100DaysOfYara #GDATATechblog @GDATA #GDATA gdatasoftware.com/blog/2025/04/3…

struppigel's tweet image. How to use knowledge about .NET structures and streams for writing better .NET Yara signatures.   

E.g. IL code patterns, method signature definitions, GUIDs, compressed length.

#100DaysOfYara #GDATATechblog @GDATA #GDATA
gdatasoftware.com/blog/2025/04/3…

Loading...

Something went wrong.


Something went wrong.


United States Trends