Introduction
Malcore will begin a technical analysis blog of the following (in no specific order):
Interesting samples
Interesting exploits
Interesting attack vectors
Or anything else deemed as interesting by the Malcore reverse engineering team
The technical blog will be updated on a regular schedule once a month. This analysis will cover a variety of information as well as technical analysis using Malcore if applicable to the point of the blog. Anything that is done through Malcore, the results will be made publicly available and a link will be placed inside of the blog. This blog may or may not be written by invited guest bloggers as well.
What Will Be Covered
The Malcore technical blog will cover a variety of information pertaining to anything listed above. This information may or may not contain the following:
Indicators of compromise (IOC)
Rules and/or signatures of samples, exploits, and attack vectors
Photos of reverse engineering
Publicly accessible Malcore result links
Technical analysis of the subject
This blog is to provide the readers with technical analysis of multiple types of cyber security related information. It will also serve as a secondary technical blog to more technical readers, or anyone who wants to better understand cyber security and/or reverse engineering.
Sign Up
It is advised to sign up for a Malcore account in order to perform your own analysis and also to follow along with the blog posts. To create an account go here:
To receive notifications from this blog on new updates, as well as new blog posts, go here: