Skip to content

Trending tags

Whitepapers

The latest research on threats and technology.

Hunting For SOTI

In this follow-on to the Killsuit research, we look into the advanced bootloader mechanism employed in The Equation Groups frameworks, which can be used in conjunction with the Killsuit modular component.

Killsuit research

Exposed by the Shadow Brokers in the 2017 "Lost in Translation" leak, not much is known about the persistence component employed in the DanderSpritz framework...until now.

F-Secure Security Cloud

F-Secure Security Cloud is a cloud-based digital threat analysis system operated by F-Secure Corporation. It consists of a constantly growing and evolving knowledge base of digital threats fed by data from

Automating advanced threat identification with Broad Context Detection™

We explore the skills and technologies needed for a context-aware approach to effectively evaluate and respond to targeted threats.

F-Secure Deepguard, 3rd Edition

We summarize the trends and developments in computing that have made host-based behavioral analysis and exploit interception necessary elements of computer security.

The state of cyber security 2017

Observations and insights to help users and businesses keep pace with a rapidly evolving threat landscape.

Ransomware: How to prevent, predict, detect & respond

Ransomware is one of the most prominent cyber threats today. Yet just like any other threat...

NanHaiShu: "Rat"ing the South China Sea

We detail the malware being used by a threat actor to target government and private-sector organizations involved in a territorial dispute centered on the South China Sea.

CozyDuke

An overview of CozyDuke, a set of tools used by one or more malicious actors for performing targeted attacks against high profile organizations...

W64/Regin, Stage 1

We describe the inner workings of the stage #1 of the complex malware threat by the name of Regin...

W32/Regin, Stage 1

We analyze a set of 32-bit samples which represents stage #1 of the complex threat that is known as Regin...

BlackEnergy & Quedagh: The convergence of crimeware and APT attacks

BlackEnergy is a toolkit that has been used for years by various criminal outfits. In the summer of 2014

COSMICDUKE: Cosmu with a twist of MiniDuke

CosmicDuke — the first malware seen to include code from both the notorious MiniDuke APT Trojan and another...

Newsletter modal

Thank you for your interest towards F-Secure newsletter. You will shortly get an email to confirm the subscription.

Gated Content modal

Congratulations – You can now access the content by clicking the button below.