VMRay | LinkedIn
Computer- und Netzwerksicherheit
Sandboxing reinvented against the malware & phishing threats of today - and tomorrow.
Jobs anzeigen Folgen-
alle 119 Mitarbeiter:innen anzeigen
- Dieses Unternehmen melden
- Übersicht
- Stellen
- Unternehmenskultur
Info
VMRay is an international enterprise security brand for solutions to detect and analyze cyber threats. Under the brand are two companies: VMRay Inc. (USA; www.vmray.com) and VMRay GmbH (Germany; www.vmray.de), each serving their respective markets and customers. For inquiries from Germany please contact VMRay GmbH and for all other inquiries please contact VMRay Inc.
Website http://www.vmray.comExterner Link zu VMRay
Branche Computer- und Netzwerksicherheit Größe 51–200 Beschäftigte Hauptsitz Bochum Art Privatunternehmen Gegründet 2013 Spezialgebiete Network Sandbox, Malware Analysis, Threat Detection, Cybersecurity, IT Security, phishing, dynamic analysis, Threat Intelligence und Security AutomationOrte
- Primär
Suttner-Nobel-Allee 7
Bochum, 44803, DE
Wegbeschreibung -
22 Boston Wharf Rd
7th Floor
Boston, Massachusetts 02210, US
Wegbeschreibung
Beschäftigte von VMRay
-
Arie Regan
-
Tom Kearns, CISSP, CCSM
-
Mounil Patel
-
Thomas Weiss
Updates
-
VMRay
7.585 Follower:innen
1 Tag- Diesen Beitrag melden
🚀 VMRay and Broadcom announce official partnership & on-premise #sandbox integration https://lnkd.in/d788e5AQ We’re excited to announce the official partnership between VMRay and Broadcom, along with the launch of the VMRay Broadcom On-Premise Sandbox integration. 🔎 What this integration delivers: • High-fidelity #malware and #phishing analysis powered by VMRay • Seamless #integration with Broadcom security environments • On-premise deployment for maximum data control and compliance 🤝 We’re excited to collaborate with Broadcom, Broadcom customers and their partner ecosystem to bring this solution to market. If your team is interested in participating in the Early Adopter Program, we’d be happy to connect and discuss next steps. 👉 Learn more about the integration: https://lnkd.in/d788e5AQ #CyberSecurity #ThreatDetection #MalwareAnalysis #SOC #Sandboxing #Broadcom #VMRay #Partnership #carbonblack
1 Kommentar Gefällt mir Kommentieren Teilen
-
VMRay
7.585 Follower:innen
3 Tage- Diesen Beitrag melden
If you're using MISP Project (@[email protected] ) for #ThreatIntelligence, this one's for you. https://lnkd.in/eDnur93Z To help #CTI teams operationalize their data, we are launching a new technical series by Koen Van Impe focused on getting the most out of VMRay within #MISP, starting with a step-by-step guide to setting up the VMRay #UniqueSignal feed. Not just a config walkthrough. It covers the kind of detail that saves you an afternoon of trial and error: - feed types, - authentication, - distribution settings, - tagging with the Admiralty Scale, - scheduling ingestion, and - building dashboard widgets to monitor feed activity Next up in the series: operationalising UniqueSignal with #MicrosoftDefender, #MicrosoftSentinel, and custom MISP workflows. 🔗 https://lnkd.in/eDnur93Z #CTI #MalwareAnalysis
1 Kommentar Gefällt mir Kommentieren Teilen
-
VMRay hat dies direkt geteilt
NetDescribe
690 Follower:innen
4 Tage Bearbeitet- Diesen Beitrag melden
Live von der ZKI Frühjahrstagung 2026 in Göttingen! 🚀🛡️ Unser Gemeinschaftsstand ist der „Place-to-be“ für IT-Sicherheit in der Forschung. Unser Experten-Team zeigt Ihnen drei entscheidende Perspektiven für einen sicheren Campus: 🔍 NetDescribe: Maximale Netzwerk-Transparenz & Datenkontrolle. 🤖 SentinelOne DACH: Autonome KI-Detektion für Endpunkte & Identitäten. 🔬 VMRay: Tiefenanalyse gegen hochkomplexe Malware. Special Guest 👉 🎯 Pentera: Automatisierte Sicherheitsvalidierung für kontinuierliche Resilienz. Ihre Experten vor Ort: 🤝 Ronald Kirch-Collins (NetDescribe) 🤝 Sven-Gerrit Schmidt und Mario Chirillo (SentinelOne) 🤝 Markus Klier und Atilla Celik (VMRay) 🤝 Christoph Strickert (Pentera) Außerdem treffen Sie Thomas Schwert von anykey GmbH, Member der Xantaro Group, an unserem Stand. Wir zeigen Ihnen unsere Lösungen als Live-Demo und freuen uns über gute Gespräche! #ZKI2026 #HochschulIT #Cybersecurity #SecurityValidation #ForschungUndLehre
2 Kommentare Gefällt mir Kommentieren Teilen
-
VMRay
7.585 Follower:innen
5 Tage- Diesen Beitrag melden
🚨Alert: New cryptocurrency stealer likely written in Zig 🔬Report: https://lnkd.in/eMAfYnJz We found a multi-stage infection chain delivering what appears to be a new cryptocurrency clipper, likely written in Zig. The infection begins with Vidar, which drops a heavily obfuscated AutoIt script that injects and executes the Zig-based stealer. This stealer resolves its C2 address through a BSC smart contract, a technique known as EtherHiding. Its primary purpose appears to be replacing cryptocurrency addresses in the clipboard with an attacker-controlled wallet. 🔎 In a nutshell: -Vidar → SFX → AutoIt Loader → Zig Crypto Stealer -The AutoIt script is heavily obfuscated, the next-stage payload is RC4-decrypted then LZNT1-decompressed at runtime before injection -Script contains junk code and performs multiple anti-sandbox and anti-AV checks, timing-based evasion, and a DNS request to a non-existing domain -C2 address is resolved via a BSC smart contract (EtherHiding) -Constantly polls clipboard for multiple cryptocurrency address formats: BTC, ETH, etc. -When a match is found: exfiltrates the victim's original address to the C2 and replaces it with attacker wallet -Likely written in Zig as some strings are uniquely associated with that language -Querying the attackers smart contract transactions, one can identify many more C2 addresses -In recent days the sample seems to drop a different payload, no longer the Zig crypto stealer 🧬 IoCs: -Zig sample SHA256: a82d031d99b15f8eb5a1d8cc24e55fec6d393d549edde8da9507f3cf17503ce1 -C2: quartermaster-sec[.]cc -Smart contract address: 0x7CC3cFC1Ac007B8c6566fD2C7419b15a75473468 via API endpoint hxxps[:]//data-seed-prebsc-1-s1[.]binance[.]org:8545 -Vidar sample SHA256: 62338c7764f4e82105ea52fab868e1f04dc2f54bb44c5a47ddac685eacd6ed3c -C2: 65.21.165[.]15 -Steam profile: hxxps[:]//steamcommunity[.]com/profiles/76561198736378968 🧩 More C2's from other smart contracts by the same creator: -artisan-advertising[.]cc -brain-game[.]cc -celebration-internet[.]cc -cmicrosoft1[.]click -devops-offensive[.]cc -ed-security-buff[.]cc -en.hugo-lapp[.]co -evil-toy[.]cc -fast-node[.]com -firewall-sentinel[.]cc -flame-guard[.]cc -kr.hugo-lapp[.]co -lavande-rocket[.]cc -quartermaster-sec[.]cc ⭐ Credits: Likely related sample documented by @0xfluxsec via https://lnkd.in/eDayyFtY (but their AutoIt script does not seem to drop the Zig crypto clipper highlighted here)
Gefällt mir Kommentieren Teilen
-
VMRay
7.585 Follower:innen
1 Woche Bearbeitet- Diesen Beitrag melden
One of Europe's biggest cybersecurity gatherings is just around the corner. And we'll be there. 🇫🇷 VMRay is heading to #InCyber Forum in #Lille (31 March – 2 April), where our team will be at our booth in the European Champions Alliance pavilion. Come talk to us about what it actually takes to detect evasive #malware and #phishing threats, and build #ThreatIntelligence you can trust, not just collect. Find us at Lille Grand Palais. Let's connect. 🤝 #InCyber #FIC2025 #ThreatIntelligence #MalwareAnalysis #Cybersecurity #VMRay
Gefällt mir Kommentieren Teilen
-
VMRay
7.585 Follower:innen
1 Woche- Diesen Beitrag melden
Securing university and research networks requires a difficult balance: enabling open collaboration while protecting critical infrastructure from targeted, evasive threats. We are heading to Göttingen next week (March 9–11) for the #ZKI-Frühjahrstagung alongside our partner NetDescribe GmbH. If you are an IT leader or defender in the academic sector, let’s connect. Markus Klier, Atilla Celik, and Alexandra Guennewig will be on-site to discuss how high-fidelity #ThreatIntelligence and precise #malware analysis can help your team filter out the noise and protect your research data. See you there.
5 Kommentare Gefällt mir Kommentieren Teilen
-
VMRay hat dies direkt geteilt
European Champions Alliance
5.047 Follower:innen
1 Woche- Diesen Beitrag melden
🌐 Discover our Media & Booth Partners at the ECA Tech Pavilion! From March 31 to April 2, 2026, we’ll be at the INCYBER Forum Europe in Lille one of Europe’s largest cybersecurity gatherings with 20,000+ attendees, 700+ exhibitors, 580+ speakers, and participants from 100+ countries. We are honored to share our pavilion with some of the most innovative cybersecurity companies shaping Europe’s digital future: 🔹Red Alert Labs – IoT security experts offering consulting, evaluation, and certification services. Their AI-driven platform CyberPass helps enterprises scale cybersecurity compliance and prepare for the Cyber Resilience Act. 🔹 VMRay – Industry-leading malware sandboxing and threat intelligence solutions, trusted by global enterprises and government agencies. 🔹 Exeo – Securing digital services across Cloud, Cybersecurity, and AI with 24/7 managed services across 16 countries. 🔹 enclaive – Europe’s top confidential computing provider, ensuring sensitive data remains secure across multi-cloud environments. 🔹 Corma – Unified IT platform centralizing applications, licenses, and user access for streamlined enterprise control. 🔹 Myra Security GmbH – Certified Security-as-a-Service protecting critical infrastructure from DDoS, botnet attacks, and database threats. 💡 Our Media Partners: 🔹 Xelera Technologies GmbH – AI and cybersecurity solutions for high-performance data centers and clouds. 🔹 EclecticIQ – European threat intelligence platform with AI-embedded solutions that empower cyber defenders and maintain data sovereignty. Come meet these innovators at the ECA Pavilion and discover Europe’s leading cybersecurity solutions under one roof. #Cybersecurity #EuropeanCyber #DigitalSovereignty #INCYBER2026 #Innovation #TechPavilion #IoTSecurity #AI #ConfidentialComputing
6 Kommentare Gefällt mir Kommentieren Teilen
-
VMRay
7.585 Follower:innen
2 Wochen- Diesen Beitrag melden
In #ThreatIntelligence, analyzing WHO is targeted often reveals the WHY behind a campaign. Our latest collaborative research by independent researcher Pol Thill reveals a highly structured, state-sponsored targeting matrix: Water utilities. Energy grids. Government agencies. Across 8 countries — and reconnaissance reaching 200+ more. This is the footprint of #HydraSaiga (also tracked as YoroTrooper / ShadowSilk) — a state-sponsored threat actor that has been quietly active since 2021, and shows no sign of slowing down. A clear pattern emerges from the victimology: 🔹 Strategic alignment: Heavy targeting of critical water and energy infrastructure in Central Asia. 🔹 Sector footprints: Unique industry focus by region—such as Water infrastructure exclusively in the CIS, and Aviation in the Middle East & Africa. For #CTI and #SOC teams, mapping these overlaps helps filter noise and prioritize defensive resources based on realistic risk profiles, rather than generic global alerts. Watch the global spread below. The full execution logic, and all extracted IOCs & TTPs (now available within the VMRay UniqueSignal Threat Intelligence Feed), are detailed in our complete analysis: 🔗 https://lnkd.in/d_awVhFG #ThreatIntelligence #CriticalInfrastructure #HydraSaiga #YoroTrooper #Cybersecurity
… mehrGefällt mir Kommentieren Teilen
-
VMRay
7.585 Follower:innen
2 Wochen- Diesen Beitrag melden
🚨 Alert: Covert payload delivery through alternative object storage platforms 🔬Report: https://lnkd.in/dfyGuQdw 📦 In a newly observed attack chain, threat actors have started exploiting lesser known object storage platforms like cubbit[.]io or ufs[.]sh as disposable payload safehouses. 🥷 The chain starts off with an obfuscated VBScript, unfolding into an obfuscated PowerShell downloader. The PS1 script downloads a seemingly harmless image file, pulled from one of these object storage platform providers. Using simple steganography, a Base64 .NET Injector payload is concealed as appended bytes at the end of the image file. The smuggled .NET Injector is then reflectively loaded into RegAsm.exe and a final Agent Tesla payload is downloaded. This attack chain shows how modern delivery chains are constantly looking for alternative platforms to host and conceal their payload. 🔎 Key takeaways: - VBS → PS1 → GuLoader / Image (steganography) → .NET Assembly → Payload on cubbit[.]eu → RegAsm.exe → Agent Tesla - Initial VBScript utilized junk code, Base64 obfuscation, word slicing, reverse string, and character substitution - Dropped PowerShell script (Base64 encoded), uses character replacement to thwart static analysis - Downloads a payload (usually GuLoader) from hosting site ufs[.]sh - Pulls an image file from firebasestorage.googleapis[.]com, which has a - Base64 blob at the end (steganography) - PowerShell parses the Base64 blob, decodes it and uses Reflection.Assembly to load the revealed executable (protected with SmartAssembly) - Dynamically locates a method named 'runss' on a type called 'Homees', invokes it with a remote payload hosted on cubbit[.]io - Injects the remote payload (Agent Tesla) into RegAsm.exe 🧬 IoCs: 1c216dc51330c5f56cc37f7e37b3516e57b172bd83f787788f80dcdb88b5545b hxxps://firebasestorage.googleapis[.]com/v0/b/https://lnkd.in/dVFztWe2 hxxps://au72nuxzv2.ufs[.]sh/f/4LhV5B1sDCwIrgzpCwYKXE4gwWVSzU8Dck1rs5tJYqhnmpx6 hxxps://zip1.s3.cubbit[.]eu/SCANNED%20COPIES%20OF%20FINAL%20CONTRACT%20PDFupload.txt
Gefällt mir Kommentieren Teilen
-
VMRay
7.585 Follower:innen
2 Wochen- Diesen Beitrag melden
📍 Day 1 in Tashkent Great start at the #FIRST Regional Symposium – Central Asia. Susanne Warken, Markus Klier, Lars Huhn, and Andrey Voitenko, CISSP are at our booth connecting with the regional #CSIRT community and exchanging insights on evasive threats and actionable threat intelligence. If you’re here, stop by and say hello 👋
Gefällt mir Kommentieren Teilen
Einfach anmelden, damit Sie nichts verpassen.
- Personen von VMRay finden, die Sie kennen
- Persönliche Jobempfehlungen erhalten
- Alle Updates, News und Artikel anzeigen
Ähnliche Seiten
-
Joe Security LLC
Computer- und Netzwerksicherheit
Reinach, Baselland
-
PHYSEC GmbH
Computer- und Netzwerksicherheit
Bochum, Nordrhein-Westfalen
-
Yttrium
Wagniskapital- und Private-Equity-Auftraggeber
Frankfurt am Main, Hessen
-
CrowdStrike
Computer- und Netzwerksicherheit
-
ANY.RUN
Computer- und Netzwerksicherheit
-
G DATA CyberDefense
Computer- und Netzwerksicherheit
Bochum, North Rhine-Westphalia
-
Filigran
Computer- und Netzwerksicherheit
-
Sophos
Softwareentwicklung
Abingdon, Oxfordshire
-
Censys
Computer- und Netzwerksicherheit
Ann Arbor, Michigan
-
Arctic Wolf
Computer- und Netzwerksicherheit
Eden Prairie, Minnesota
Jobs durchsuchen
-
Analyst-Jobs
54.870 freie Stellen -
Director-Jobs
73.946 freie Stellen -
Projektmanager-Jobs
15.641 freie Stellen -
Vertriebsingenieur-Jobs
16.350 freie Stellen -
CEO-Jobs
3.125 freie Stellen -
Junior-Controller-Jobs
1.026 freie Stellen -
Sicherheitsberater-Jobs
67 freie Stellen -
IT-Berater-Jobs
25.984 freie Stellen -
Redakteur-Jobs
1.462 freie Stellen -
IT-Administrator-Jobs
9.513 freie Stellen -
Autor-Jobs
493 freie Stellen -
Direktor-Jobs
763 freie Stellen -
Controller-Jobs
10.281 freie Stellen -
Produktmanager-Jobs
4.466 freie Stellen -
Marketingleiter-Jobs
88 freie Stellen -
Entwickler-Jobs
21.496 freie Stellen -
IT-Leiter-Jobs
810 freie Stellen -
Business Analyst-Jobs
5.224 freie Stellen -
Ausbildungsleiter-Jobs
201 freie Stellen -
CFO-Jobs
1.398 freie Stellen
Finanzierung
VMRay Insgesamt 5 FinanzierungsrundenLetzte Runde
Serie B 19. Jan. 2023 Externer Crunchbase-Link für die letzte Finanzierungsrunde11.143.019,00 $
Investor:innen
-
- Analyst-Jobs
- Entwickler-Jobs
- Produktionsleiter-Jobs
- Recruiter-Jobs
- Texter-Jobs
- Redakteur-Jobs
- Autor-Jobs
- IT-Leiter-Jobs
- Director-Jobs
- Projektmanager-Jobs
- Vertriebsleiter-Jobs
- Marketingleiter-Jobs
- Vertriebsingenieur-Jobs
- Event-Manager-Jobs
- Social Media-Manager-Jobs
- Projektmanagement-Jobs
- Marketingassistent-Jobs
- CEO-Jobs
- Business Development-Jobs
- Account-Manager-Jobs
- HR-Manager-Jobs
- PHP-Entwickler-Jobs
- Sicherheitsingenieur-Jobs
- Innenarchitekt-Jobs
- Scrum Master-Jobs
- Direktor-Jobs
Zustimmen und LinkedIn beitreten
Wenn Sie auf „Weiter“ klicken, um Mitglied zu werden oder sich einzuloggen, stimmen Sie der Nutzervereinbarung, der Datenschutzrichtlinie und der Cookie-Richtlinie von LinkedIn zu.
Loggen Sie sich ein, um zu sehen, wen Sie bereits bei VMRay kennen.
E-Mail-Adresse/Telefon Passwort Einblenden Passwort vergessen? Einloggen Mit E-Mail einloggenoder
Neu bei LinkedIn? Mitglied werden
Wenn Sie auf „Weiter“ klicken, um Mitglied zu werden oder sich einzuloggen, stimmen Sie der Nutzervereinbarung, der Datenschutzrichtlinie und der Cookie-Richtlinie von LinkedIn zu.
Từ khóa » Vm Ray Bochum
-
Search For Jobs | VMRay Careers
-
Contact Us: VMRay Malware Detection & Malware Analysis Company
-
VMRay - Crunchbase Company Profile & Funding
-
Nano-Scale Morphology Of Melanosomes Revealed By Small-Angle ...
-
Use Of Small-angle X-ray Scattering To Resolve Intracellular
-
Use Of Small-angle X-ray Scattering To Resolve Intracellular Structure ...
-
Flavio S. Nogueira - Inspire HEP
-
[PDF] Cosmic Neutrinos From Temporarily Gamma-suppressed Blazars
-
K. Wiesemann's Research Works | Ruhr-Universität Bochum, Bochum ...
-
(PDF) Template Assisted Self-assembly Of Iron Oxide Nanoparticles
-
Neutron And X-Ray Scattering Of Fluids At High Pressure And High ...
-
Self-assembled Iron Oxide Nanoparticle Multilayer - IOPscience
-
Ruhr-Universität Bochum, Theoretische Physik, Weltraum - NASA/ADS