Working in incident response or malware analysis, you may have come across compromised and sometimes revoked certificates used to sign malware of different types. Often threat groups use stolen certificates to sign their malware. I'd like to show you an easy way to...
Short Tutorial: How to Create a YARA Rule for a Compromised Certificate
read more