The Latest in IT Security

Posts Tagged ‘submissions’

Last week, I was working a shift in SophosLabs triaging customer submissions, and found myself updating detection for the Troj/DocDrop-S Trojan horse. Keen readers will remember that I have talked about the Troj/DocDrop-S malware before, in relation to the presentation that Stephen Edwards and I gave at the recent Virus Bulletin conference in Barcelona. The […]

Read more ...

I was recently asked a few questions about malwareblacklist.com, a project I created a while back. 1. What is the idea behind MalwareBlacklist.com? The goal is to create a quality resource for security researchers and companies looking for up-to-date malicious sites. 2. Who typically are users of MalwareBlacklist.com? Our users range from traditional malware researchers, […]

Read more ...


Categories

TUESDAY, JUNE 25, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments