-
Under the advanced threat method, we suggest an approach:
* **In-Depth Analysis** - If malware is discovered, but cannot be identified, further analysis will be necessary. This may also trigger a c…
-
### Description
What happens if Defender for Storage identifies malware in a blob being uploaded. Will the blob be missing or unavailable? We need decide whether we want to keep the file-scan feature…
-
**Is your feature request related to a problem? Please describe.**
When investigating an incident, we can find new items related to incident that can be useful to analyse.respond to/pivot against whe…
-
**Is your feature request related to a problem? Please describe.**
Right now, when using `draksetup install` we can only install one OS for malware analysis and if we install some other OS, the previ…
-
Hi there,
I was wondering if you're interested in including your extractor in [Assemblyline](https://cybercentrecanada.github.io/assemblyline4_docs/), our open-source malware analysis platform.
…
-
In the relationship tables in the spec, Malware obj table says "av-analysis-of" and Malware Analysis obj table says "analysis-of."
-
Hi OSSF team,
I recently tried the following example:
```bash
sudo scripts/run_analysis.sh -ecosystem pypi -package Django
```
However, I encountered the following error:
```bash
------…
-
Installer gets a very poor score (high confidence malicious) on both Filescan and Hybrid-Analysis. Is there any way to remove unnecessary API imports or change the way bundled resources are delivered …
-
We have come to an agreement with aidevteam-icloud to provide outside software generation consulting to ensure plausible deniability. We are excited about the opportunities over the next iteration of…
-
Hello, here is the Virtus Total analysis of the file:
https://github.com/akiomik/vimeo-dl/releases/download/v0.1.0/vimeo-dl_0.1.0_windows_386.tar.gz
Which indicates that it contains the MALWARE…