Matt SuicheinComae TechnologiesActive Email Campaign Identified With Malicious Excel FilesWe identified a potential campaign in preparation where the victim would received a zip file containing a Malicious Excel file embedding…Feb 22, 2020Feb 22, 2020
Matt SuicheinComae TechnologiesHow to Assess and Respond to Assets In Your Cloud?Analyze your Azure and AWS virtual machines from one command.May 5, 2019May 5, 2019
Matt SuicheinComae TechnologiesHow to Solve the Blindspots of Event-Driven DetectionA while back, I discussed how memory could be used as an ultimate form of the log as long as the analysis workflow and process is smooth.Apr 24, 2019Apr 24, 2019
Matt SuicheinComae TechnologiesLeveraging Microsoft Graph API for memory forensicsEndpoint alerts are good, but sometimes it’s not enough.Jan 17, 2019Jan 17, 2019
Matt SuicheinComae TechnologiesProcess Dump Support in Comae StardustWe now support minidumps!Nov 26, 2018Nov 26, 2018
Matt SuicheinComae TechnologiesThe release of Dmp2Json & Querying Memory Images through JSON formatTL;DR: Go on https://my.comae.io — Create an account, download the latest version of our toolkit, play with Dmp2Json.Oct 7, 2018Oct 7, 2018
Matt SuicheinComae TechnologiesWin 1 BlackHat USA 2018 complementary ticket!Want to go to BlackHat USA 2018? I’ve decided to give away one of my BlackHat USA ticket that I get as a Review Board member as I won’t…Jul 24, 2018Jul 24, 2018
Matt SuicheinComae TechnologiesRethinking Logging for Critical AssetsGoing beyond log files, accepting memory as its own format.Feb 20, 20181Feb 20, 20181
Matt SuicheinComae TechnologiesAnnouncing Comae Cryptocurrency eXchange Taskforce (CCXT)Yesterday on twitter, I announced the formation of the Comae Cryptocurrency eXchange Taskforce (CCXT). As more and more news breaks about…Feb 13, 2018Feb 13, 2018
Matt SuicheinComae TechnologiesYARA scans in WinDbgBecause InfoSec loves RegExes.Feb 7, 2018Feb 7, 2018