blog.f-secure.com Open in urlscan Pro
2600:9000:2250:9200:18:36a1:2e00:93a1  Public Scan

Submitted URL: http://f-secure.com/documents/996508/1030745/deepguard_whitepaper.pdf
Effective URL: https://blog.f-secure.com/whitepapers/
Submission: On September 11 via manual from DZ — Scanned from DE

Form analysis 1 forms found in the DOM

https://blog.f-secure.com/search/

<form action="https://blog.f-secure.com/search/">
  <input class="js-search-bar-input" type="text" name="query" placeholder="Type your search here">
  <button type="submit" class="c-btn c-btn--search js-search-bar-submit" disabled=""> Search </button>
</form>

Text Content

Skip to content
BLOG
F-Secure.com
About This Blog
Search
en
 * Suomi
 * Français
 * Deutsch
 * Italiano
 * Español
 * Nederlands
 * 日本語
 * Português


Trending tags
 * Business Security
 * Home Security
 * Threats & Research
 * F-Secure Life
 * Podcasts
 * Videos
 * Whitepapers


Search

Close

 * Business Security
 * Home Security
 * Threats & Research
 * F-Secure Life
 * Podcasts
 * Videos
 * Whitepapers

Search
en
 * Suomi
 * Français
 * Deutsch
 * Italiano
 * Español
 * Nederlands
 * 日本語
 * Português

TRENDING TAGS

 * Best Practice
 * Cyber Security Experts Answer
 * Cyber Threat Landscape
 * Data Breach
 * Digital Parenting
 * Identity Theft
 * IoT
 * Privacy
 * Ransomware
 * Smart Home
 * Social Media


WHITEPAPERS


THE LATEST RESEARCH ON THREATS AND TECHNOLOGY.


OUTERHAVEN: THE UEFI MEMORY SPACE JUST ITCHING TO BE MISUSED

UEFI - the link between a machine's hardware and operating system - is also a
potential path for attacks that can persist even if the device is wiped and a
fresh OS installed. Let's look at attacks - and potential methods of detection.

Download PDF


F-SECURE ULTRALIGHT

F-Secure Ultralight combines several unique and advanced technologies to improve
protection level, performance, and user experience in our consumer and corporate
products.

Download PDF


HUNTING FOR SOTI

In this follow-on to the Killsuit research, we look into the advanced bootloader
mechanism employed in The Equation Groups frameworks, which can be used in
conjunction with the Killsuit modular component.

Download PDF


KILLSUIT RESEARCH

Exposed by the Shadow Brokers in the 2017 "Lost in Translation" leak, not much
is known about the persistence component employed in the DanderSpritz
framework...until now.

Download PDF


F-SECURE SECURITY CLOUD

F-Secure Security Cloud is a cloud-based threat analysis system operated by
F-Secure. It’s growing knowledge base of digital threats is fed by data from
client systems and automated threat analysis services.

Download PDF


AUTOMATING ADVANCED THREAT IDENTIFICATION WITH BROAD CONTEXT DETECTION™

We explore the skills and technologies needed for a context-aware approach to
effectively evaluate and respond to targeted threats.

Download PDF


F-SECURE DEEPGUARD, 3RD EDITION

We summarize the trends and developments in computing that have made host-based
behavioral analysis and exploit interception necessary elements of computer
security.

Download PDF


THE STATE OF CYBER SECURITY 2017

Observations and insights to help users and businesses keep pace with a rapidly
evolving threat landscape.

Download PDF


RANSOMWARE: HOW TO PREVENT, PREDICT, DETECT & RESPOND

Ransomware is one of the most prominent cyber threats today. Yet just like any
other threat...

Download PDF


NANHAISHU: "RAT"ING THE SOUTH CHINA SEA

We detail the malware being used by a threat actor to target government and
private-sector organizations involved in a territorial dispute centered on the
South China Sea.

Download PDF


REFLASH: PRACTICAL ACTIONSCRIPT3 INSTRUMENTATION WITH RABCDASM

The research described on this paper concentrates exclusively on the Flash part
of this complete picture.

Download PDF


THE DUKES

This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke,
CozyDuke, etc- of the Dukes, a well-resourced, highly dedicated and organized
cyberespionage group that we believe has been working for the Russian Federation
since at least 2008 to collect intelligence in support of foreign and security
policy decision-making.

Download PDF


COZYDUKE

An overview of CozyDuke, a set of tools used by one or more malicious actors for
performing targeted attacks against high profile organizations...

Download PDF


W64/REGIN, STAGE 1

We describe the inner workings of the stage #1 of the complex malware threat by
the name of Regin...

Download PDF


W32/REGIN, STAGE 1

We analyze a set of 32-bit samples which represents stage #1 of the complex
threat that is known as Regin...

Download PDF


BLACKENERGY & QUEDAGH: THE CONVERGENCE OF CRIMEWARE AND APT ATTACKS

BlackEnergy is a toolkit that has been used for years by various criminal
outfits. In the summer of 2014

Download PDF


COSMICDUKE: COSMU WITH A TWIST OF MINIDUKE

CosmicDuke — the first malware seen to include code from both the notorious
MiniDuke APT Trojan and another...

Download PDF

 * About This Blog
 * F-Secure
 * Contact us

 * Back to front page
 * Privacy Policy
 * Terms of Service



FOLLOW US

 * facebook
 * instagram
 * twitter
 * youtube

Copyright 2022 F-Secure Blog



DO YOU WANT TO STAY POSTED?

Get special discounts, free tips and tools, and learn about new security
threats. Sign up to our newsletter!

Close

Newsletter modal

Thank you for your interest towards F-Secure newsletter. You will shortly get an
email to confirm the subscription.

Gated Content modal

Congratulations – You can now access the content by clicking the button below.


WE USE COOKIES TO IMPROVE YOUR EXPERIENCE

We use cookies to improve your experience on this and other websites. Cookies
are text files stored by your browser. They contain information that helps us
tailor the content you see on F‑Secure pages, aggregate statistics of site usage
and performance, and offer more relevant advertisements of our products and
services elsewhere on the web. Accepting all cookies provides you with a better
user experience. By using F‑Secure websites, you accept the use of cookies. By
declining you opt-out from optional cookies. You may also adjust your settings
to disable certain optional cookies.

Accept all Decline

Change settings


COOKIE SETTINGS

FUNCTIONAL COOKIES

ALWAYS ON

These cookies are required for our website to work properly or by regulations
that apply to us, and cannot be turned off. Among other things, they take care
of secure login sessions to the My F‑Secure service, storing your country of
origin, and remembering the cookie preferences you select.

PERFORMANCE COOKIES

ALWAYS ON

These cookies help us collect statistics of how you and other customers use our
website. We always look at aggregate data, and nothing about you, personally, is
stored. Performance cookies also allow us to run A/B tests on our site and
tailor its content based on your device type, for example.

PERSONALISATION COOKIES

ON OFF

These cookies help us personalise the content and offers we provide to you,
based on your usage of our website and other digital plat­forms. This ensures we
can always offer you the content and information that benefits you the most.

MARKETING COOKIES

ON OFF

These cookies are mostly set by advertisement platform providers such as Google
or Facebook. They help us decipher, based on your actions on our site, which of
our products, services, and offers are the most relevant for you. We use this
data to tailor the ads you see on other websites.

F‑Secure website privacy policy
Save and exit Back