2019-11-08 | Xavier Mertens | Microsoft Apps Diverted from Their Main Use |
2019-07-25 | Rob VandenBrink | When Users Attack! Users (and Admins) Thwarting Security Controls |
2017-03-05 | Didier Stevens | Another example of maldoc string obfuscation, with extra bonus: UAC bypass |
2016-12-13 | Xavier Mertens | UAC Bypass in JScript Dropper |
2016-11-16 | Xavier Mertens | Example of Getting Analysts & Researchers Away |
2015-06-16 | John Bambenek | CVE-2014-4114 and an Interesting AV Bypass Technique |
2014-03-13 | Daniel Wesemann | Identification and authentication are hard ... finding out intention is even harder |
2013-09-18 | Rob VandenBrink | Cisco DCNM Update Released |
2012-05-08 | Bojan Zdrnja | Windows Firewall Bypass Vulnerability and NetBIOS NS |
2008-04-22 | donald smith | Symantec decomposer rar bypass allowed malicious content. |