930 articles

A Disembodied Threat

One of the most sophisticated mechanisms malware uses to stay below security systems’ radars is having no detectable file body. Malware creators use various techniques to accomplish that. Perhaps the most insidious of which is the execution of the malicious code wholly within the machine’s volatile memory.

Advanced cyberthreats, demystified

Cyberweapons have to communicate to their creators, propagate within the infrastructure and send data. That’s when an effective and highly flexible algorithm can be capable of spotting them.