<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3343693239455968046</id><updated>2020-03-02T09:52:18.307+01:00</updated><category term="Malware Research Institute"/><category term="Security"/><category term="MART"/><category term="malware"/><category term="Cloudbook"/><category term="Code"/><category term="Linux / OSS"/><category term="EEE PC"/><category term="Presentations"/><category term="Live Broadcast"/><category term="44Con"/><category term="Lab"/><category term="Politics"/><category term="Cuckoo"/><category term="DeepSec"/><category term="Wiki updates"/><category term="Proxmox"/><category term="Virtualbox"/><category term="Blackhat USA 2011"/><category term="Defcon 19"/><category term="Tips"/><category term="Virtualization"/><category term="Nessus"/><category term="Ubuntu"/><category term="HowTo"/><category term="KVM"/><category term="Ubertooth"/><category term="Book review"/><category term="Cloud Computing"/><category term="ConVirt"/><category term="GlusterFS"/><category term="Metasploit"/><category term="OSX"/><category term="OWASP"/><category term="Online Gaming"/><category term="Penetration testing"/><category term="iOS"/><category term="AWS"/><category term="BinaryPig"/><category term="Dionaea"/><category term="EC2"/><category term="FOG Project"/><category term="Facebook"/><category term="Hadoop"/><category term="IPMI"/><category term="Inetsim"/><category term="Kippo"/><category term="MongoDB"/><category term="OpenVZ"/><category term="PHUKD"/><category term="Password Security"/><category term="VXCage"/><category term="fbpwn"/><category term="hardware"/><category term="honeypot"/><category term="unfs3"/><title type='text'>Michael Boman</title><subtitle type='html'>Application Vulnerability and Malicious Code Hunter</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>336</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-3789625470893658748</id><published>2015-07-26T00:16:00.001+02:00</published><updated>2015-07-26T00:16:10.692+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Complex Incident Response Investigations: How to Minimise Breach Impact</title><content type='html'>I just published a new blog entry &#39;&lt;a href=&quot;http://ift.tt/1LKSGQR&quot;&gt;Complex Incident Response Investigations: How to Minimise Breach Impact&lt;/a&gt;&#39; over at the &lt;a href=&quot;http://ift.tt/1FDUtCO&quot;&gt;Malware Research Institute&lt;/a&gt;. </content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/3789625470893658748/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/07/new-malware-research-institute-complex.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/3789625470893658748'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/3789625470893658748'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/07/new-malware-research-institute-complex.html' title='New Malware Research Institute: Complex Incident Response Investigations: How to Minimise Breach Impact'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-8775353821410425517</id><published>2015-04-03T16:24:00.001+02:00</published><updated>2015-04-03T16:24:04.165+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Reverse Engineering Mac Malware</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1D0kOvO&#39;&gt;Reverse Engineering Mac Malware&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/8775353821410425517/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/04/new-malware-research-institute-reverse.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/8775353821410425517'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/8775353821410425517'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/04/new-malware-research-institute-reverse.html' title='New Malware Research Institute: Reverse Engineering Mac Malware'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-2146937074885639428</id><published>2015-04-02T19:17:00.001+02:00</published><updated>2015-04-02T19:17:00.769+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: APTs: Getting Serious About Zero-Day Threats</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1ELBmJU&#39;&gt;APTs: Getting Serious About Zero-Day Threats&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/2146937074885639428/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/04/new-malware-research-institute-apts.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/2146937074885639428'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/2146937074885639428'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/04/new-malware-research-institute-apts.html' title='New Malware Research Institute: APTs: Getting Serious About Zero-Day Threats'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-4627577561102349543</id><published>2015-04-01T14:56:00.001+02:00</published><updated>2015-04-01T14:56:53.450+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Extracting Actionable Cyber Intelligence from a RAT Named Poison Ivy</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1aiywPT&#39;&gt;Extracting Actionable Cyber Intelligence from a RAT Named Poison Ivy&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/4627577561102349543/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/04/new-malware-research-institute.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/4627577561102349543'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/4627577561102349543'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/04/new-malware-research-institute.html' title='New Malware Research Institute: Extracting Actionable Cyber Intelligence from a RAT Named Poison Ivy'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-8825782779476531110</id><published>2015-03-30T23:15:00.001+02:00</published><updated>2015-03-30T23:15:38.947+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Illbuster - fighting illegal content</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1Cqqaif&#39;&gt;Illbuster - fighting illegal content&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/8825782779476531110/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute_30.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/8825782779476531110'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/8825782779476531110'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute_30.html' title='New Malware Research Institute: Illbuster - fighting illegal content'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-5336935645819863978</id><published>2015-03-29T09:26:00.009+02:00</published><updated>2015-03-29T09:26:10.368+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Deploying ICS Honeypots to Deceive and Thwart Adversaries</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1BI25kD&#39;&gt;Deploying ICS Honeypots to Deceive and Thwart Adversaries&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/5336935645819863978/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute_29.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/5336935645819863978'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/5336935645819863978'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute_29.html' title='New Malware Research Institute: Deploying ICS Honeypots to Deceive and Thwart Adversaries'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-4861421467530309663</id><published>2015-03-29T09:26:00.007+02:00</published><updated>2015-03-29T09:26:09.576+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: A Threat-Based Security Monitoring Case Study</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1D58FGc&#39;&gt;A Threat-Based Security Monitoring Case Study&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/4861421467530309663/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-threat.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/4861421467530309663'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/4861421467530309663'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-threat.html' title='New Malware Research Institute: A Threat-Based Security Monitoring Case Study'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-3207354826472914302</id><published>2015-03-29T09:26:00.005+02:00</published><updated>2015-03-29T09:26:08.735+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Cuckoo Sandbox and its recent developments</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1D58FpJ&#39;&gt;Cuckoo Sandbox and its recent developments&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/3207354826472914302/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-cuckoo_29.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/3207354826472914302'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/3207354826472914302'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-cuckoo_29.html' title='New Malware Research Institute: Cuckoo Sandbox and its recent developments'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-1862109565270727577</id><published>2015-03-29T09:26:00.003+02:00</published><updated>2015-03-29T09:26:07.812+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: YARA: The pattern matching swiss knife for malware researchers and everyone else</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1BI27c5&#39;&gt;YARA: The pattern matching swiss knife for malware researchers and everyone else&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/1862109565270727577/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-yara.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/1862109565270727577'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/1862109565270727577'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-yara.html' title='New Malware Research Institute: YARA: The pattern matching swiss knife for malware researchers and everyone else'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-4298211491432831232</id><published>2015-03-29T09:26:00.001+02:00</published><updated>2015-03-29T09:26:06.695+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Visual Malware Reversing: How to Stop Reading Assembly and Love the Code</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1BI26VH&#39;&gt;Visual Malware Reversing: How to Stop Reading Assembly and Love the Code&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/4298211491432831232/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-visual.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/4298211491432831232'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/4298211491432831232'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-visual.html' title='New Malware Research Institute: Visual Malware Reversing: How to Stop Reading Assembly and Love the Code'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-3329120163371276850</id><published>2015-03-24T19:14:00.001+01:00</published><updated>2015-03-24T19:14:56.979+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: You can panic now. Host Protection is (mostly) dead</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1Ir7NM6&#39;&gt;You can panic now. Host Protection is (mostly) dead&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/3329120163371276850/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-you-can.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/3329120163371276850'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/3329120163371276850'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-you-can.html' title='New Malware Research Institute: You can panic now. Host Protection is (mostly) dead'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-8976914095524814263</id><published>2015-03-23T22:45:00.001+01:00</published><updated>2015-03-23T22:45:30.336+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: 10 Ways to Rock Your SOC</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1DQwxyB&#39;&gt;10 Ways to Rock Your SOC&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/8976914095524814263/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-10-ways.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/8976914095524814263'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/8976914095524814263'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-10-ways.html' title='New Malware Research Institute: 10 Ways to Rock Your SOC'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-1304473934505719830</id><published>2015-03-22T18:09:00.003+01:00</published><updated>2015-03-22T18:09:15.895+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Reconciling Objective Data with Analytical Uncertainty</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/19ISbbB&#39;&gt;Reconciling Objective Data with Analytical Uncertainty&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/1304473934505719830/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute_22.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/1304473934505719830'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/1304473934505719830'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute_22.html' title='New Malware Research Institute: Reconciling Objective Data with Analytical Uncertainty'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-7866089079497014804</id><published>2015-03-22T18:09:00.001+01:00</published><updated>2015-03-22T18:09:14.591+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: DFIR Summit 2014 Keynote: Barbarians at Every Gate: Responding to a Determined Adversary</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/19ISbbx&#39;&gt;DFIR Summit 2014 Keynote: Barbarians at Every Gate: Responding to a Determined Adversary&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/7866089079497014804/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-dfir.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/7866089079497014804'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/7866089079497014804'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-dfir.html' title='New Malware Research Institute: DFIR Summit 2014 Keynote: Barbarians at Every Gate: Responding to a Determined Adversary'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-3190987414661746976</id><published>2015-03-20T21:19:00.003+01:00</published><updated>2015-03-20T21:19:09.716+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Introduction to Windows Memory Analysis</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1GAgh2u&#39;&gt;Introduction to Windows Memory Analysis&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/3190987414661746976/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute_20.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/3190987414661746976'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/3190987414661746976'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute_20.html' title='New Malware Research Institute: Introduction to Windows Memory Analysis'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-5403551175635769902</id><published>2015-03-20T21:19:00.001+01:00</published><updated>2015-03-20T21:19:08.382+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Brian Baskin - Introducing Intelligence into Malware Analysis</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1GAgi6z&#39;&gt;Brian Baskin - Introducing Intelligence into Malware Analysis&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/5403551175635769902/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-brian.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/5403551175635769902'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/5403551175635769902'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-brian.html' title='New Malware Research Institute: Brian Baskin - Introducing Intelligence into Malware Analysis'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-4309163084112063736</id><published>2015-03-18T19:30:00.001+01:00</published><updated>2015-03-18T19:30:18.626+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Malware Hunting with Mark Russinovich and the Sysinternals Tools</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1AFYTFA&#39;&gt;Malware Hunting with Mark Russinovich and the Sysinternals Tools&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/4309163084112063736/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-malware_18.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/4309163084112063736'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/4309163084112063736'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-malware_18.html' title='New Malware Research Institute: Malware Hunting with Mark Russinovich and the Sysinternals Tools'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-473108227259017877</id><published>2015-03-17T21:30:00.003+01:00</published><updated>2015-03-17T21:30:27.492+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Malware Hunting with the Sysinternals Tools</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1BRpR10&#39;&gt;Malware Hunting with the Sysinternals Tools&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/473108227259017877/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-malware_17.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/473108227259017877'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/473108227259017877'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-malware_17.html' title='New Malware Research Institute: Malware Hunting with the Sysinternals Tools'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-3558306911638101434</id><published>2015-03-17T21:30:00.001+01:00</published><updated>2015-03-17T21:30:25.951+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Reverse Engineering By Crayon</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1BRpNyf&#39;&gt;Reverse Engineering By Crayon&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/3558306911638101434/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-reverse.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/3558306911638101434'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/3558306911638101434'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-reverse.html' title='New Malware Research Institute: Reverse Engineering By Crayon'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-7840956967275395404</id><published>2015-03-15T18:15:00.001+01:00</published><updated>2015-03-15T18:15:38.517+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Cuckoo Sandbox - malware beware [SIGINT13]</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1DopcWS&#39;&gt;Cuckoo Sandbox - malware beware [SIGINT13]&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/7840956967275395404/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-cuckoo_15.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/7840956967275395404'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/7840956967275395404'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-cuckoo_15.html' title='New Malware Research Institute: Cuckoo Sandbox - malware beware [SIGINT13]'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-8195023142187604243</id><published>2015-03-14T23:00:00.001+01:00</published><updated>2015-03-14T23:00:33.403+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Cuckoo Sandbox - Automated Malware Analysis</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1FgEs7h&#39;&gt;Cuckoo Sandbox - Automated Malware Analysis&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/8195023142187604243/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-cuckoo_14.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/8195023142187604243'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/8195023142187604243'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-cuckoo_14.html' title='New Malware Research Institute: Cuckoo Sandbox - Automated Malware Analysis'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-1478781769618353016</id><published>2015-03-13T20:53:00.001+01:00</published><updated>2015-03-13T20:53:52.393+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Memory Forensics for Incident Response - SANS DFIR WEBCAST</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1EbLNRy&#39;&gt;Memory Forensics for Incident Response - SANS DFIR WEBCAST&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/1478781769618353016/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-memory.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/1478781769618353016'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/1478781769618353016'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-memory.html' title='New Malware Research Institute: Memory Forensics for Incident Response - SANS DFIR WEBCAST'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-3995590168262982057</id><published>2015-03-12T22:11:00.001+01:00</published><updated>2015-03-12T22:11:21.679+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Analysis and Correlation of Macintosh Logs - SANS DFIR WEBCASTS</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1HMZ86l&#39;&gt;Analysis and Correlation of Macintosh Logs - SANS DFIR WEBCASTS&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/3995590168262982057/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-analysis.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/3995590168262982057'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/3995590168262982057'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-analysis.html' title='New Malware Research Institute: Analysis and Correlation of Macintosh Logs - SANS DFIR WEBCASTS'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-4892562778021483990</id><published>2015-03-11T22:25:00.001+01:00</published><updated>2015-03-11T22:25:20.530+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: Malware Immunization via Infection Markers</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1HEAXXX&#39;&gt;Malware Immunization via Infection Markers&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/4892562778021483990/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-malware.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/4892562778021483990'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/4892562778021483990'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-malware.html' title='New Malware Research Institute: Malware Immunization via Infection Markers'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3343693239455968046.post-1384648481718515931</id><published>2015-03-11T22:00:00.001+01:00</published><updated>2015-03-11T22:00:24.744+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware Research Institute"/><title type='text'>New Malware Research Institute: How memory forensics will help you lose weight and look ten years younger - SANS DFIR WEBCAST</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I just published a new blog entry &#39;&lt;a href=&#39;http://ift.tt/1wvhI1E&#39;&gt;How memory forensics will help you lose weight and look ten years younger - SANS DFIR WEBCAST&lt;/a&gt;&#39; over at the &lt;a href=&#39;http://ift.tt/1FDUtCO&#39;&gt;Malware Research Institute&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.michaelboman.org/feeds/1384648481718515931/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-how_11.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/1384648481718515931'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3343693239455968046/posts/default/1384648481718515931'/><link rel='alternate' type='text/html' href='http://blog.michaelboman.org/2015/03/new-malware-research-institute-how_11.html' title='New Malware Research Institute: How memory forensics will help you lose weight and look ten years younger - SANS DFIR WEBCAST'/><author><name>Michael Boman</name><uri>http://www.blogger.com/profile/11401103751625555325</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>