April 30, 2024, 3:10 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

Traditional hashing algorithms (e.g., MD5, SHA-1) provide an essential tool for security applications. Although commonly used for allowlisting and blocklisting, traditional hashes have significant drawbacks for detecting malware. First, a malicious file must be seen before a hash can be created so polymorphic attacks are not detectable. Second, hashes are fragile, enabling malware authors to make inconsequential changes to files to avoid detection.


ReversingLabs Hashing Algorithm (“RHA”) addresses these issues by intelligently hashing a file’s features rather than its bits. …

algorithm algorithms allowlisting applications attacks authors blocklisting can file hash hashes hashing malicious malware md5 polymorphic reversinglabs security tool

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Sr. Security Engineer

@ BedRock Systems | San Francisco, Boston, DC, Berlin, Munich, Bengaluru

Project Manager - Project Principal Consultant

@ SAP | Istanbul, TR, 34700

Software Security Engineer

@ Ledger | Paris, France