Blog

Featured Article

process-hollowing-analysis-for-malware-detection

Process Hollowing Analysis For Malware Detection

Following a webinar hosted by my colleague Justin Seitz two weeks ago, we discuss here of the detection of process hollowing, and how this capability may help in detecting ongoing cyber attacks.

Read more

Most Recent Article

investigating_privilege_elevation_on_linux

Investigating Privilege Elevation on Linux

acp_pdf-2_file_document

We’re talking about ways in order to elevate privileges on the Linux platform and the discussion today will also be of use for anybody who’s worried about privilege elevation on other UNIX platforms. Basically, whenever you’re worried with privilege elevation on UNIX, there are basically two paths that you should be looking at or for elevating privileges.

Watch a video version instead

Read more

investigating_privilege_elevation_on_linux

Investigating Privilege Elevation on Linux

insider_threats

Insider Threats

investigating_privilege_elevation_on_linux

Detection of Privilege Elevation by Malware on Linux

live_remote_memory_forensics_with_snow

Detecting Malware Through Process Chain Analysis

Executive Space

Investigating Privilege Elevation on Linux

acp_pdf-2_file_document

We’re talking about ways in order to elevate privileges on the Linux platform and the discussion today will also be of use for anybody who’s worried about privilege elevation on other UNIX platforms. Basically, whenever you’re worried with privilege elevation on UNIX, there are basically two paths that you should be looking at or for elevating privileges.

Watch a video version instead

Read more

Benoit Hamelin

[email protected]