Key takeaways from our presentation @ Bsides Zurich by Carlos Rubio, our lead Malware Researcher and Jonas Wagner, co-founder and CTO.

Malicious binary code is frequently used in attacks and a highly valuable IOC

By making it searchable, you can leverage it in novel ways:

  • broad and resilient code-based signatures
  • that are easy to create
  • applicable back in time
  • discover fine-grained relations
  • Hunt through binary code the same way as you do through other types of data

Full presentation

Ready to find out how Threatray can protect your organization?

Talk to an expert