The latest research on threats and technology.
ROI of Cyber Security
The ability to quantify your cyber security ROI with confidence and conviction is the key to defending your business case to the C-suite.
F-Secure’s cyber security ROI calculator is out now! It’s based on extensive experience combined with robust statistical models. Learn about the factors behind the formula and see some example calculations from different industries and company sizes.
Download PDF
Demystifying Threat Hunting
‘Threat hunting’ has become something of a buzzword in the cyber security industry, and like any other buzzword the term is often misused.
Proactive threat hunting is very different from manually searching through raw data to find an attacker, and threat hunting as a service is complementary to detection & response operations rather than a replacement for them.
Download PDF
Understanding the email threat landscape
We’re seeing a rise in phishing attacks against cloud-based email services such as Microsoft Office 365 as an increasing number of companies transition to the more cost-efficient cloud solutions. Email has been, and remains as, the primary initial attack vector used by attackers to infiltrate an organization’s server.
Download PDF
Outerhaven: The UEFI Memory space just itching to be misused
UEFI – the link between a machine’s hardware and operating system – is also a potential path for attacks that can persist even if the device is wiped and a fresh OS installed. Let’s look at attacks – and potential methods of detection.
Download PDF
F-Secure Ultralight
F-Secure Ultralight combines several unique and advanced technologies to improve protection level, performance, and user experience in our consumer and corporate products
Download PDF
Killsuit research
Exposed by the Shadow Brokers in the 2017 “Lost in Translation” leak, not much is known about the persistence component employed in the DanderSpritz framework…until now.
Download PDF
F-Secure Security Cloud
F-Secure Security Cloud is a cloud-based threat analysis system operated by F-Secure. It’s growing knowledge base of digital threats is fed by data from client systems and automated threat analysis services.
Download PDF
Automating advanced threat identification with Broad Context Detection™
We explore the skills and technologies needed for a context-aware approach to effectively evaluate and respond to targeted threats.
Download PDF
Hunting For SOTI
In this follow-on to the Killsuit research, we look into the advanced bootloader mechanism employed in The Equation Groups frameworks, which can be used in conjunction with the Killsuit modular component.
Download PDF
The state of cyber security 2017
Observations and insights to help users and businesses keep pace with a rapidly evolving threat landscape.
Download PDF
F-Secure Deepguard, 3rd Edition
We summarize the trends and developments in computing that have made host-based behavioral analysis and exploit interception necessary elements of computer security.
Download PDF
NanHaiShu: "Rat"ing the South China Sea
We detail the malware being used by a threat actor to target government and private-sector organizations involved in a territorial dispute centered on the South China Sea.
Download PDF
Ransomware: How to prevent, predict, detect & respond
Ransomware is one of the most prominent cyber threats today. Yet just like any other threat…
Download PDF
The Dukes
This whitepaper explores the tools – such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the Dukes, a well-resourced, highly dedicated and organized cyberespionage group that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.
Download PDF
CozyDuke
An overview of CozyDuke, a set of tools used by one or more malicious actors for performing targeted attacks against high profile organizations…
Download PDF
Reflash: practical ActionScript3 instrumentation with RABCDAsm
The research described on this paper concentrates exclusively on the Flash part of this complete picture.
Download PDF
How to stop data breaches & prevent GDPR fines
You are welcome to download one of our whitepapers off our website on How to Stop Data Breaches & Prevent GDPR Fines which is a Data Breach Toolkit for Small and Medium-Sized Companies to find out how to predict, prevent, detect & respond to data breaches and the fines that they can cause.
Download PDF
W64/Regin, Stage 1
We describe the inner workings of the stage #1 of the complex malware threat by the name of Regin…
Download PDF
W32/Regin, Stage 1
We analyze a set of 32-bit samples which represents stage #1 of the complex threat that is known as Regin…
Download PDF
BlackEnergy & Quedagh: The convergence of crimeware and APT attacks
BlackEnergy is a toolkit that has been used for years by various criminal outfits. In the summer of 2014
Download PDF
COSMICDUKE: Cosmu with a twist of MiniDuke
CosmicDuke — the first malware seen to include code from both the notorious MiniDuke APT Trojan and another…
Download PDF
Rethinking Response
This whitepaper is for CISOs, CIOs, and any security professional who needs to successfully manage and respond to incidents.
Download PDF