A Profile of the Backoff PoS Malware that Hit 1000+ Retail Businesses
Introduction to Malware - Part 1
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evasive Malware — Christopher Kruegel at Black Hat 2014
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
CKE Restaurants Selects Lastline for APT Security
Lastline Case Study
Malware in the Wild: Evolving to Evade Detection
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware