Intelligence-driven search and analysis function
Second line of defence tailored for enterprise security teams
Link to YouTube video
Our CTO and co-founder Jonas Wagner alongside Carlos Rubio Ricote, malware researcher at Threatray will run the workshop “Using systematic code reuse analysis to create robust YARA rules”
We are proud to announce Threatray Release v2.0. Dive in below to discover its highlights.
Multiple blogs have reported about recent activities and tooling of UAC-0056 (also known as Nodaria, SaintBear, TA471).