To Obfuscate, or not to Obfuscate

Every Tool in the Tool Box

Introduction When I teach people about reverse engineering, I often hear the following statement: ...

Read More

PoSeidon Completionist

Introduction Most gamers have explored every nook and cranny of their favorite game, completing ...

Read More

Another Brick in the FrameworkPoS

Introduction FrameworkPoS is a well-documented family of malware that targets Point of Sale (PoS) ...

Read More

New Memory Scraping Technique in Cherry Picker PoS Malware

Introduction Working primarily with point of sale malware, we regularly see the telltale signs of ...

Read More

Shining the Spotlight on Cherry Picker PoS Malware

Introduction For the last five years Trustwave has been monitoring a threat across a number of ...

Read More

New Episode of Punkey PoS Malware Airs

Reruns from the 1980s are all the rage these days, and like the sitcom it's based on, we've ...

Read More

New POS Malware Emerges - Punkey

During a recent United States Secret Service investigation, Trustwave encountered a new family of ...

Read More

Alina POS malware 'sparks' off a new variant

Alina is a well-documented family of malware used to scrape Credit Card (CC) data from Point of ...

Read More