Product
Game Protection
Anti-Cheat & Anti-Hack
Online Protection
Solutions
FPS Game Solution
SLG Game Solution
Casual Game Solution
MMO Game Solution
Card Game Solution
Help Center
Android
User Manual
Tool Download
FAQ
iOS
User Manual
Tool Download
FAQ
Windows
User Manual
Tool Download
FAQ
Blog
Price
Android
iOS
Windows
Company
About us
Why JikGuard
Contact us
Free Trial
News
Don’t Let Malware Slip Through Your Fingers
Detecting and stopping malware is a difficult problem to solve. As the methods of detection and prevention become more advanced so too do the techniques used by malware authors.
March 5, 2018
Secure by Design: Enhanced Interfaces Improve Email Security and Malware Analysis
In the infosec world, it’s well established that time is a precious commodity. Time to detection and time to resolution are critical concepts that can mean the difference between a...
Feb. 1, 2018
The new face of Threat Grid for 2018
Threat Grid's engineering team is always working on improvements to our leading malware analysis and threat intelligence platform. In the latter part of 2017 and into early 2018, the team...
Jan. 31, 2018
Black Hat Europe 2017: Malware Analysis in the SOC
New Cisco Threat Grid dashboard yields faster malware analysis and response Black Hat Europe kicked off just after the X Factor series finale was recorded
Dec. 8, 2017
Malware Analysis for the Incident Responder
Malware is one of the most prevalent and most insidious forms of cyber attack. Identifying and eliminating them are critical in minimizing the impact of
Feb. 2, 2017
H1N1: Technical analysis reveals new capabilities
This blog is the first in a 3 part series that will provide an in-depth technical analysis on the H1N1 malware. I’ll be looking at how H1N1 has evolved,
Sept. 13, 2016
Down the Rabbit Hole: Botnet Analysis for Non-Reverse Engineers
This post is authored by Earl Carter & Holger Unterbrink. Overview Talos is often tasked with mapping the backend network for a specific piece of
Sept. 30, 2015
Cognitive Research: Learning Detectors of Malicious Network Traffic
This post was authored by Karel Bartos, Vojtech Franc, & Michal Sofka. Malware is constantly evolving and changing. One way to identify malware is by analyzing the...
Sept. 3, 2015
Malicious PNGs: What You See Is Not All You Get!
This post was authored by Earl Carter and Nick Randolph. Threat actors are continually evolving their techniques. One of the latest Graftor variants is
Feb. 25, 2015
Far East Targeted by Drive by Download Attack
This blog was co-authored by Kevin Brooks, Alex Chiu, Joel Esler, Martin Lee, Emmanuel Tacheau, Andrew Tsonchev, and Craig Williams. On the 21st of
July 28, 2014
The Art of Escape
Craig Williams and Jaeson Schultz have contributed to this post. We blogged in September of 2013 about variants of Havex. A month ago on June 2, 2014, I
July 3, 2014