Making a better sandbox
The effectiveness of a sandbox largely depends on its ability to realistically imitate a working environment.
8 articles
The effectiveness of a sandbox largely depends on its ability to realistically imitate a working environment.
Our Danish colleague spilled a lot of cybersecurity ink in his works.
Researcher Patrick Wardle has demonstrated how a chain of exploits can be successfully used to attack macOS Catalina.
We developed a sandbox capable of emulating a company-specific system in an isolated environment.
We’ve made a free version of our Threat Intelligence Portal for detailed analysis of potential threats.
Eugene Kaspersky explains how Kaspersky Sandbox uses virtual machines to thoroughly examine malware’s behavior.
How an analyst can build a threat intelligence workflow to run effective and complex investigations.
A cloud instrument for detailed malware activity analysis.