Key takeaways from our presentation @ Bsides Zurich by Carlos Rubio, our lead Malware Researcher and Jonas Wagner, co-founder and CTO.

Malicious binary code is frequently used in attacks and a highly valuable IOC
By making it searchable, you can leverage it in novel ways:
- broad and resilient code-based signatures
- that are easy to create
- applicable back in time
- discover fine-grained relations
- Hunt through binary code the same way as you do through other types of data