Homepage
Open in app
Sign in
Get started
Comae Technologies
Do not be the last one to know about your own breach.
Products
Labs
Events
Hire Comae
Follow
Active Email Campaign Identified With Malicious Excel Files
Active Email Campaign Identified With Malicious Excel Files
We identified a potential campaign in preparation where the victim would received a zip file containing a Malicious Excel file embedding…
Matt Suiche
Feb 22, 2020
How to Assess and Respond to Assets In Your Cloud?
How to Assess and Respond to Assets In Your Cloud?
Analyze your Azure and AWS virtual machines from one command.
Matt Suiche
May 5, 2019
How to Solve the Blindspots of Event-Driven Detection
How to Solve the Blindspots of Event-Driven Detection
A while back, I discussed how memory could be used as an ultimate form of the log as long as the analysis workflow and process is smooth.
Matt Suiche
Apr 23, 2019
Pragmatic Political Campaign Security
Unique Threats Beyond Influence Campaigns
thaddeus t. grugq
Feb 24, 2019
Leveraging Microsoft Graph API for memory forensics
Leveraging Microsoft Graph API for memory forensics
Endpoint alerts are good, but sometimes it’s not enough.
Matt Suiche
Jan 17, 2019
Trending
Are your cryptocurrency wallets safe?
Are your cryptocurrency wallets safe?
TL;DR; Detect DLL injection with Comae Stardust. #MemoryForensics #Blockchain
Matt Suiche
Feb 1, 2018
The release of Dmp2Json & Querying Memory Images through JSON format
TL;DR: Go on https://my.comae.io — Create an account, download the latest version of our toolkit, play with Dmp2Json.
Matt Suiche
Oct 7, 2018
DEF CON 25: Porosity
DEF CON 25: Porosity
Decompiling Ethereum Smart-Contracts
Matt Suiche
Jul 27, 2017
About Comae Technologies
Latest Stories
Archive
About Medium
Terms
Privacy
Teams