Intelligence-driven search and analysis function
Second line of defence tailored for enterprise security teams
Link to YouTube video
Threatray’s new endpoint memory scanner is used by CERN alongside its intelligence platform.
In this blog post we detail the analysis of a .NET multi-stage malware loader that delivers stealers, RATs, and keyloggers.
Recent research by Malwarebytes (April 2021), Kaspersky (June 2021) and the Korean CERT (September 2021), reports about attacks on South Korean entities, employing new techniques and malware not previously identified.