TrueBot Malware: What It Is and How to Hunt It
TrueBot malware is used for data exfiltration and has been used by infamous groups. Learn to hunt it with YARA rules in Magnet AXIOM Cyber.
TrueBot malware is used for data exfiltration and has been used by infamous groups. Learn to hunt it with YARA rules in Magnet AXIOM Cyber.
We have added a new option for analyzing Microsoft crash dumps in Axiom Cyber with the integration of Comae memory analysis technology.
As part of the Comae beta program (currently open in Magnet Idea Lab), we are regularly introducing new features for the community of testers to provide feedback on.
When analyzing malware and exploits (or troubleshooting issues), you’ll find it in memory—even if it can’t be found on disk. Memory will give you a look at the exact state of a device at a specific time; this is why memory analysis, or memory forensics, is important to DFIR (Digital Forensics and Incident Response).
We’re excited to introduce Comae to Magnet Idea Lab—giving you a chance to beta test the solution and give us valuable feedback!
Magnet Forensics has acquired the strategic IP assets of Comae Technologies, a company that specializes in cloud-based memory analysis.