Resources

Most recent uploads

case studies

Whatever Conflicts May Come

1) A new service appears to host at client site which we had never seen before. No recorded presence about it online. 2) Our analysts fetch the file and immediately begin reverse engineering it.

infographics

Cybersecurity Jobs

Resource: Rise of the 'accidental' cybersecurity professional

infographics

Cybersecurity Lingo: End-to-End Encryption

Resource:  Your Cybersecurity Self-Defense Cheat Sheet

case studies

Whatever Conflicts May Come

infographics

Things That Can Be Hacked Part IV

infographics

Things That Can Be Hacked Part III

infographics

Things That Can Be Hacked Part II

infographics

Things That Can Be Hacked Part I

infographics

The Impact Cybercrime Can Have on a Small Business

infographics

How Cybersecurity looks for Canada in 2017

infographics

Cybersecurity Lingo: Man-in-the-middle-attack

infographics

Cybersecurity Lingo: End-to-End Encryption

infographics

Cybersecurity Jobs

infographics

2017 + Cybersecurity: Mobile Security

YouTube video thumbnail
videos

Investigating Privilege Elevation on Linux

YouTube video thumbnail
videos

Detecting Malware Through Process Chain Analysis

YouTube video thumbnail
videos

Looking for Cyber Threats Through Statistical Outliers

infographics

2017 + Cybersecurity: Ransomware

infographics

2017 + Cybersecurity: IoT Devices

infographics

A Look Back to 2016 + Cybersecurity: Financial Sector

YouTube video thumbnail
videos

Responding to Cyber Incidents

infographics

A Look Back to 2016 + Cybersecurity: Ransomware

infographics

A Look Back to 2016 + Cybersecurity: DDoS

YouTube video thumbnail
videos

SNOW Live Memory forensics: analyzing suspicious code

YouTube video thumbnail
videos

Cycon 2016

data sheets

Arc4dia's One Pager

webinars

Live Analysis of a Process Hollowing

data sheets

SNOW Cloud Diagram

data sheets

SNOW Internal Processes Diagram

webinars

Live Remote Memory Forensics with SNOW

data sheets

Trusted Hunting Partner Program (THP)

data sheets

SNOWboard Flyer

YouTube video thumbnail
videos

SNOWboard Demo

YouTube video thumbnail
videos

SNOW Live

data sheets

SNOW Mobile Flyer

data sheets

Arc4dia's Catalogue

courses

Threat Detection and Simulated Engagement

case studies

Message in the Bottle

courses

Introduction to Reverse Engineering

courses

APT Tactics and Defense

case studies

Half a World Away

YouTube video thumbnail
videos

What is SNOWboard?

YouTube video thumbnail
videos

SNOWboard Objects

YouTube video thumbnail
videos

SNOWboard Mitigation

YouTube video thumbnail
videos

SNOWboard Memory Map

YouTube video thumbnail
videos

SNOWboard Map

YouTube video thumbnail
videos

SNOWboard Login

YouTube video thumbnail
videos

SNOWboard Leads

YouTube video thumbnail
videos

SNOWboard Investigations

YouTube video thumbnail
videos

SNOWboard Hosts

YouTube video thumbnail
videos

SNOWboard Example #1

YouTube video thumbnail
videos

SNOWboard Collaboration

YouTube video thumbnail
videos

SNOWboard Clustering Rules

case studies

Feedback Loop

courses

Advanced Reverse Engineering

YouTube video thumbnail
videos

WSNOW Case Study

YouTube video thumbnail
videos

Securing Bitcoin and it’s attack surface by Pierre Roberge

YouTube video thumbnail
videos

SNOW in 60 seconds

YouTube video thumbnail
videos

Interview with CSO, Marc Theberge

YouTube video thumbnail
videos

The Illusion of Closed Platform Security By Pierre Roberge

reports

Dridex Banker

YouTube video thumbnail
videos

SNOW from Arc4dia

reports

Malware z13.exe