Skip to main content
Category:
Malware Evasion
Case study – preventing Malgent trojan horse
12/09/2024
Intro Yesterday (September 12th, 2024) our Active Endpoint Deception platform prevented a new variant of Malgent trojan horse that was…
The Role of Large Language Models in Enhancing Ransomware and Malware Threats
22/08/2024
As technology evolves, so do the tactics of cybercriminals. Large Language Models (LLMs) like GPT-4, designed to assist in various…
Deceptive Bytes discovers DLL hijacking vulnerabilities in Microsoft’s SysInternals tools
21/02/2022
Background We previously covered DLL Hijacking when we discovered extensive vulnerabilities in .NET, which potentially open any .NET application to…
Recent attacks on European organizations
24/11/2021
Deceptive Bytes' research team detected in recent days a wave of attacks on European organizations, while the attacks are not…
The little virus that took down an empire
05/03/2020
Every day, all around the world, malware is attacking organizations and businesses from all sizes, affecting their day-to-day activities and…
The “Early Bird Special” – a new twist on the “Early Bird” injection technique
10/10/2019
There are many injection techniques used by malware authors, from simply calling CreateRemoteThread to advance ones like AtomBombing, PROPagate…
Why ML/AI is not cyber and endpoint security savior
28/01/2019
Artificial Intelligence (AI) and Machine Learning (ML) are considered the next evolution in computer science as they allow computers to…
Predictions for 2019
19/12/2018
The new year is around the corner and as we prepare for it, we wanted to take a look at…
Tricks used by malware authors to protect their malicious code from detection
09/07/2018
In our last two posts we've shown how vendors like Symantec and Microsoft (among others) miss detecting threats due to…
Skip to content
Open toolbar
Accessibility tools
Accessibility tools
Enlarge text
Enlarge text
Reducing text
Reducing text
Shades of gray
Shades of gray
High contrast
High contrast
Negative contrast
Negative contrast
Light background
Light background
Links Underline
Links Underline
Readable font
Readable font
Reset
Reset