Remove 08
Remove 2014 Remove 2016 Remove Computer and Electronics Remove Security
article thumbnail

Malware researcher reverse engineered a threat that went undetected for at least 2 years

Security Affairs

reg file to enumerate tons of security tools that have been widely used by analysts to analyze Malware. VT shows the first time it captured that hash (sha256): it was in 2016. But then the first submission is on 2018-08-14 a few days ago. But what about the almost 2 years between December 2016 and August 2018?