blog.f-secure.com
Open in
urlscan Pro
2600:9000:2250:9200:18:36a1:2e00:93a1
Public Scan
Submitted URL: http://f-secure.com/documents/996508/1030745/deepguard_whitepaper.pdf
Effective URL: https://blog.f-secure.com/whitepapers/
Submission: On September 11 via manual from DZ — Scanned from DE
Effective URL: https://blog.f-secure.com/whitepapers/
Submission: On September 11 via manual from DZ — Scanned from DE
Form analysis
1 forms found in the DOMhttps://blog.f-secure.com/search/
<form action="https://blog.f-secure.com/search/">
<input class="js-search-bar-input" type="text" name="query" placeholder="Type your search here">
<button type="submit" class="c-btn c-btn--search js-search-bar-submit" disabled=""> Search </button>
</form>
Text Content
Skip to content BLOG F-Secure.com About This Blog Search en * Suomi * Français * Deutsch * Italiano * Español * Nederlands * 日本語 * Português Trending tags * Business Security * Home Security * Threats & Research * F-Secure Life * Podcasts * Videos * Whitepapers Search Close * Business Security * Home Security * Threats & Research * F-Secure Life * Podcasts * Videos * Whitepapers Search en * Suomi * Français * Deutsch * Italiano * Español * Nederlands * 日本語 * Português TRENDING TAGS * Best Practice * Cyber Security Experts Answer * Cyber Threat Landscape * Data Breach * Digital Parenting * Identity Theft * IoT * Privacy * Ransomware * Smart Home * Social Media WHITEPAPERS THE LATEST RESEARCH ON THREATS AND TECHNOLOGY. OUTERHAVEN: THE UEFI MEMORY SPACE JUST ITCHING TO BE MISUSED UEFI - the link between a machine's hardware and operating system - is also a potential path for attacks that can persist even if the device is wiped and a fresh OS installed. Let's look at attacks - and potential methods of detection. Download PDF F-SECURE ULTRALIGHT F-Secure Ultralight combines several unique and advanced technologies to improve protection level, performance, and user experience in our consumer and corporate products. Download PDF HUNTING FOR SOTI In this follow-on to the Killsuit research, we look into the advanced bootloader mechanism employed in The Equation Groups frameworks, which can be used in conjunction with the Killsuit modular component. Download PDF KILLSUIT RESEARCH Exposed by the Shadow Brokers in the 2017 "Lost in Translation" leak, not much is known about the persistence component employed in the DanderSpritz framework...until now. Download PDF F-SECURE SECURITY CLOUD F-Secure Security Cloud is a cloud-based threat analysis system operated by F-Secure. It’s growing knowledge base of digital threats is fed by data from client systems and automated threat analysis services. Download PDF AUTOMATING ADVANCED THREAT IDENTIFICATION WITH BROAD CONTEXT DETECTION™ We explore the skills and technologies needed for a context-aware approach to effectively evaluate and respond to targeted threats. Download PDF F-SECURE DEEPGUARD, 3RD EDITION We summarize the trends and developments in computing that have made host-based behavioral analysis and exploit interception necessary elements of computer security. Download PDF THE STATE OF CYBER SECURITY 2017 Observations and insights to help users and businesses keep pace with a rapidly evolving threat landscape. Download PDF RANSOMWARE: HOW TO PREVENT, PREDICT, DETECT & RESPOND Ransomware is one of the most prominent cyber threats today. Yet just like any other threat... Download PDF NANHAISHU: "RAT"ING THE SOUTH CHINA SEA We detail the malware being used by a threat actor to target government and private-sector organizations involved in a territorial dispute centered on the South China Sea. Download PDF REFLASH: PRACTICAL ACTIONSCRIPT3 INSTRUMENTATION WITH RABCDASM The research described on this paper concentrates exclusively on the Flash part of this complete picture. Download PDF THE DUKES This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the Dukes, a well-resourced, highly dedicated and organized cyberespionage group that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making. Download PDF COZYDUKE An overview of CozyDuke, a set of tools used by one or more malicious actors for performing targeted attacks against high profile organizations... Download PDF W64/REGIN, STAGE 1 We describe the inner workings of the stage #1 of the complex malware threat by the name of Regin... Download PDF W32/REGIN, STAGE 1 We analyze a set of 32-bit samples which represents stage #1 of the complex threat that is known as Regin... Download PDF BLACKENERGY & QUEDAGH: THE CONVERGENCE OF CRIMEWARE AND APT ATTACKS BlackEnergy is a toolkit that has been used for years by various criminal outfits. In the summer of 2014 Download PDF COSMICDUKE: COSMU WITH A TWIST OF MINIDUKE CosmicDuke — the first malware seen to include code from both the notorious MiniDuke APT Trojan and another... Download PDF * About This Blog * F-Secure * Contact us * Back to front page * Privacy Policy * Terms of Service FOLLOW US * facebook * instagram * twitter * youtube Copyright 2022 F-Secure Blog DO YOU WANT TO STAY POSTED? Get special discounts, free tips and tools, and learn about new security threats. Sign up to our newsletter! Close Newsletter modal Thank you for your interest towards F-Secure newsletter. You will shortly get an email to confirm the subscription. Gated Content modal Congratulations – You can now access the content by clicking the button below. WE USE COOKIES TO IMPROVE YOUR EXPERIENCE We use cookies to improve your experience on this and other websites. Cookies are text files stored by your browser. They contain information that helps us tailor the content you see on F‑Secure pages, aggregate statistics of site usage and performance, and offer more relevant advertisements of our products and services elsewhere on the web. Accepting all cookies provides you with a better user experience. By using F‑Secure websites, you accept the use of cookies. By declining you opt-out from optional cookies. You may also adjust your settings to disable certain optional cookies. Accept all Decline Change settings COOKIE SETTINGS FUNCTIONAL COOKIES ALWAYS ON These cookies are required for our website to work properly or by regulations that apply to us, and cannot be turned off. Among other things, they take care of secure login sessions to the My F‑Secure service, storing your country of origin, and remembering the cookie preferences you select. PERFORMANCE COOKIES ALWAYS ON These cookies help us collect statistics of how you and other customers use our website. We always look at aggregate data, and nothing about you, personally, is stored. Performance cookies also allow us to run A/B tests on our site and tailor its content based on your device type, for example. PERSONALISATION COOKIES ON OFF These cookies help us personalise the content and offers we provide to you, based on your usage of our website and other digital platforms. This ensures we can always offer you the content and information that benefits you the most. MARKETING COOKIES ON OFF These cookies are mostly set by advertisement platform providers such as Google or Facebook. They help us decipher, based on your actions on our site, which of our products, services, and offers are the most relevant for you. We use this data to tailor the ads you see on other websites. F‑Secure website privacy policy Save and exit Back