July 26, 2023, 8:50 a.m. | Xavier

/dev/random blog.rootshell.be

Today, I published the following diary on isc.sans.edu: “Suspicious IP Addresses Avoided by Malware Samples“: Modern malware samples implement a lot of anti-debugging and anti-analysis techniques. The idea is to slow down the malware analyst’s job or, more simply, to bypass security solutions like sandboxes. These days, I see more and more malware


The post [SANS ISC] Suspicious IP Addresses Avoided by Malware Samples appeared first on /dev/random.

addresses analysis analyst anti-analysis anti-debugging bypass debugging down edu ip addresses isc job malware malware analyst modern malware sandboxes sans sans.edu sans internet storm center sans isc security security solutions slow solutions techniques today

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States