Remove 08
article thumbnail

Malware researcher reverse engineered a threat that went undetected for at least 2 years

Security Affairs

During the analysis time, only really few Antivirus (6 out of 60) were able to “detect” the sample. The attacker enumerates 571 possible analysis tools that should not be present on the target machine (Victim). reg) analysis program. Multiple programming styles have been found during the analysis path.

article thumbnail

Open Source Security Podcast EP. 151 - The DARPA Cyber Grand Challenge With David Brumley

ForAllSecure

We're here, two years after the contest, trying to commercialize some of the technology, but definitely not everything that was demonstrated at the CGC. David Brumley : 08:17 That really reflects reality. Josh Bressers : 08:38 This was all done by your system, right? David Brumley : 08:46 Humans made zero decisions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Open Source Security Podcast EP. 151 - The DARPA Cyber Grand Challenge With David Brumley

ForAllSecure

We're here, two years after the contest, trying to commercialize some of the technology, but definitely not everything that was demonstrated at the CGC. David Brumley : 08:17 That really reflects reality. Josh Bressers : 08:38 This was all done by your system, right? David Brumley : 08:46 Humans made zero decisions.

article thumbnail

OPEN SOURCE SECURITY PODCAST EP. 151-- THE DARPA CYBER GRAND CHALLENGE WITH DAVID BRUMLEY

ForAllSecure

We're here, two years after the contest, trying to commercialize some of the technology, but definitely not everything that was demonstrated at the CGC. David Brumley : 08:17 That really reflects reality. Josh Bressers : 08:38 This was all done by your system, right? David Brumley : 08:46 Humans made zero decisions.