Showing page 1231 of 1240 of 1750 results.

Blog
You found a malicious executable! Now you've got a crucial question to answer: did the file execute? We'll discuss a few sources of evidence you can use to answer this question. In this post, we will focus on static or "dead drive" forensics on Windows systems. We will cover four main sources of evidence: Windows Prefetch, Registry, Log Files, and File Information.
Blog
The FireEye Labs Advanced Reverse Engineering (FLARE) Team is sharing a third installment of a blog about the IDA Pro script with the community.
Blog
Two Chinese Advanced Persistent Threat (APT) groups quickly adapted their approach after details came to light about a zero-day vulnerability.