Intezer

@IntezerLabs

Introducing a Genetic Malware Analysis technology, revolutionizing cyber threat detection and response

Vrijeme pridruživanja: kolovoz 2015.

Tweetovi

Blokirali ste korisnika/cu @IntezerLabs

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @IntezerLabs

  1. Prikvačeni tweet
    prije 5 sati

    Have you heard about our NEW Cloud Workload Protection solution? Defend in runtime against the leading cause of cyber attacks: unauthorized & malicious code. Request a demo today:

    Poništi
  2. prije 10 sati

    New variant discovered by with 0 detections in VT. Shares ~95% code with another malicious Dex file 66c053b62231ef5a129d4f07d05d958ed8a998d056a67077d6328ed1c1a99cac

    Poništi
  3. 31. sij

    We're honored to be named one of the most promising Israeli startups. Thank you for the recognition!

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Intezer Analyze from nominated in the category of 'Threat Hunting' in the . To know more click here:

    Poništi
  5. proslijedio/la je Tweet
    30. sij

    Iranian hackers target US government workers in new campaign by

    Poništi
  6. 30. sij

    New campaign from . The Iranian-backed group is using an updated toolset tailored to US-based companies to evade detection. Technical analysis by & :

    Poništi
  7. 28. sij

    We found this Chinese PE malware's ELF version using our Cross-Architecture-Platform (WIN32 -> ELF64) code connection engine. Steals screenshots and waits for further commands from C2. Decodes VBS during runtime

    Poništi
  8. 28. sij

    Starting now! Join us at tlv!

    Poništi
  9. 27. sij

    Join us tomorrow, for a live demo of our new product: Intezer Protect . Register Here: Read more here:

    Poništi
  10. 27. sij

    Must read article in by our CEO about The forgotten link between Linux threats & cloud Security: ו

    Poništi
  11. 27. sij

    Blog link - Zip files MD5s - 34184b8590ac12f08cd9cb872c38f3c4 cfb9871d24e89ff375ff38a695e0cfac

    Prikaži ovu nit
    Poništi
  12. 27. sij

    We wanted to thank VT user @r3dbU7z for reaching us to share related files to our latest ChinaZ blog. Among the contents of two zip files he sent us we identified every CNC binary of each of the different implants we documented, along with a PHP based DDoS client

    Prikaži ovu nit
    Poništi
  13. 26. sij
    Poništi
  14. 23. sij

    Want to see Intezer Protect, our new product, in action? Join us on Tuesday, for a live demo. Register Here: Read more here:

    Poništi
  15. 23. sij

    Are you joining TLV next week? Stop by our booth and see a live demo of one of our Genetic Malware Analysis based solutions: Intezer Protect and Intezer Analyze! See you next week!

    Poništi
  16. 22. sij
    Prikaži ovu nit
    Poništi
  17. 22. sij

    It is not the first time we see the North Korean actor reusing code between its different tools. We previously wrote about the shared code between and the malware, , which is also attributed to this group

    Prikaži ovu nit
    Poništi
  18. 22. sij

    (aka Group 123 / StarCruft / Reaper) component mentioned in recent 's report shares unique code and strings with the malware uncovered by

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    21. sij

    I'm very excited about this achievement and partnering with . team, thank you! It is amazing to work with such passionate people, that believe in our vision, and want to make a real difference in the cybersecurity space.

    Poništi
  20. proslijedio/la je Tweet
    21. sij

    We're excited to welcome to the OpenView family! 🎉 Read all about their next-generation solutions for cloud security and malware analysis and our partnership here:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·