July 26, 2023, 8:50 a.m. | Xavier

/dev/random blog.rootshell.be

Today, I published the following diary on isc.sans.edu: “Suspicious IP Addresses Avoided by Malware Samples“: Modern malware samples implement a lot of anti-debugging and anti-analysis techniques. The idea is to slow down the malware analyst’s job or, more simply, to bypass security solutions like sandboxes. These days, I see more and more malware


The post [SANS ISC] Suspicious IP Addresses Avoided by Malware Samples appeared first on /dev/random.

addresses analysis analyst anti-analysis anti-debugging bypass debugging down edu ip addresses isc job malware malware analyst modern malware sandboxes sans sans.edu sans internet storm center sans isc security security solutions slow solutions techniques today

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Officer Hospital Laguna Beach

@ Allied Universal | Laguna Beach, CA, United States

Sr. Cloud DevSecOps Engineer

@ Oracle | NOIDA, UTTAR PRADESH, India

Cloud Operations Security Engineer

@ Elekta | Crawley - Cornerstone

Cybersecurity – Senior Information System Security Manager (ISSM)

@ Boeing | USA - Seal Beach, CA

Engineering -- Tech Risk -- Security Architecture -- VP -- Dallas

@ Goldman Sachs | Dallas, Texas, United States