Jeff White

Jeff White

Dissecting Hancitor’s Latest 2018 Packer
February 27, 2018
PowerStager Analysis
January 12, 2018
Analyzing the Various Layers of AgentTesla’s Packing
September 25, 2017
The Curious Case of Notepad and Chthonic: Exposing a Malicious Infrastructure
August 15, 2017
LabyREnth CTF 2017 Winners!
August 3, 2017
VIDEO: Tips, Tricks, and Clues to Escape the LabyREnth CTF
June 28, 2017
Pulling the Brake on the Magnitude EK Train
April 13, 2017
Pulling Back the Curtains on EncodedCommand PowerShell Attacks
March 10, 2017
Farming Malicious Documents to Unravel Ransomware
January 27, 2017
LabyREnth Capture the Flag (CTF): Mobile Track Solutions
September 29, 2016
LabyREnth Capture the Flag (CTF): Windows Track 1-6 Solutions
September 15, 2016
LabyREnth Capture the Flag (CTF): Threat Track Solutions
September 1, 2016
Pythons and Unicorns and Hancitor…Oh My! Decoding Binaries Through Emulation
August 30, 2016
LabyREnth Capture the Flag (CTF): Unix Track Solutions
August 25, 2016
VB Dropper and Shellcode for Hancitor Reveal New Techniques Behind Uptick
August 21, 2016
LabyREnth Capture the Flag (CTF): Document Track Solutions
August 18, 2016
How to Track Actors Behind Keyloggers Using Embedded Credentials
July 12, 2016
AutoFocus Lenz: Taking the Blue (Team) Pill
May 3, 2016
Ransomware: Locky, TeslaCrypt, Other Malware Families Use New Tool To Evade Detection
April 8, 2016
KeyBase Threat Grows Despite Public Takedown: A Picture is Worth a Thousand Words
February 25, 2016
SpiderMal: Deep PassiveDNS Analysis with Maltego
January 29, 2016
ProxyBack Malware Turns User Systems Into Proxies Without Consent
December 23, 2015

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

© 2018 Palo Alto Networks, Inc. All rights reserved.