VMRay | LinkedIn
Computer- und Netzwerksicherheit
Sandboxing reinvented against the malware & phishing threats of today - and tomorrow.
Jobs anzeigen Folgen-
alle 121 Mitarbeiter:innen anzeigen
- Dieses Unternehmen melden
- Übersicht
- Stellen
- Unternehmenskultur
Info
VMRay is an international enterprise security brand for solutions to detect and analyze cyber threats. Under the brand are two companies: VMRay Inc. (USA; www.vmray.com) and VMRay GmbH (Germany; www.vmray.de), each serving their respective markets and customers. For inquiries from Germany please contact VMRay GmbH and for all other inquiries please contact VMRay Inc.
Website http://www.vmray.comExterner Link zu VMRay
Branche Computer- und Netzwerksicherheit Größe 51–200 Beschäftigte Hauptsitz Bochum Art Privatunternehmen Gegründet 2013 Spezialgebiete Network Sandbox, Malware Analysis, Threat Detection, Cybersecurity, IT Security, phishing, dynamic analysis, Threat Intelligence und Security AutomationOrte
- Primär
Suttner-Nobel-Allee 7
Bochum, 44803, DE
Wegbeschreibung -
22 Boston Wharf Rd
7th Floor
Boston, Massachusetts 02210, US
Wegbeschreibung
Beschäftigte von VMRay
-
Arie Regan
-
Tom Kearns, CISSP, CCSM
-
Mounil Patel
-
Thomas Weiss
Updates
-
VMRay
7.481 Follower:innen
2 Tage- Diesen Beitrag melden
We’ll be at the TF-#CSIRT Joint Regional Symposium Europe this week 🇪🇸 From 4–6 February, you’ll find the VMRay team at our booth in Jerez de la Frontera—come by to talk #evasion, #malware analysis, and what actually works against today’s threats. 🎤 Day 1 highlight: Patrick Staubmann will present “Turning Evasion Techniques Against Malware”, sharing how defenders can flip attacker tradecraft to their advantage. Looking forward to connecting with the CSIRT community! #MalwareAnalysis #ThreatIntelligence #ThreatDetection
Gefällt mir Kommentieren Teilen
-
VMRay
7.481 Follower:innen
1 Woche Bearbeitet- Diesen Beitrag melden
⏰ Tomorrow: Detection & Intelligence Highlights Webinar. https://lnkd.in/dUB7XvZH If your team is dealing with evasive #phishing and #infostealers, this session is built for you. We’ll break down: 🧠 #Clickfix attacks — browser-based social engineering and complex redirection chains that slip past traditional controls ☁️ SharePoint & OneDrive abuse — spotting multi-stage delivery hiding in trusted cloud infrastructure 🕵️ #MetaStealer config extraction — instantly pivoting on C2 and attacker infrastructure from real-world samples ⭐ Live demo highlight: See how to automate analysis of user-reported phishing emails by integrating VMRay sandbox with KnowBe4 #PhishER — turning reports into high-fidelity detections, fast. Join us tomorrow and walk away with detections, pivots, and automation you can actually use. https://lnkd.in/dUB7XvZH Read the details of the integration here: https://lnkd.in/dWR8mC3x
Gefällt mir Kommentieren Teilen
-
VMRay
7.481 Follower:innen
1 Woche- Diesen Beitrag melden
🚨 Alert: Previously undocumented Tornado v51 variant from Prince of Persia (Infy) APT 🔬 Report: https://lnkd.in/d_j3CpXq We have recently spotted an infostealer sample, which shows code similarities to previous Foudre/Tonnerre malware variants from the Prince of Persia/Infy APT groups, but the infostealer seems to call itself Tornado with a v051 version marker. This would align well with previously discovered variants like the last Foudre v50 variant and how Tornado seems to be a continuation of that. Prince of Persia, also known as Infy, is an Iranian state-sponsored APT group active since at least 2007, targeting dissidents, civil society, journalists, diplomats, and critical infrastructure primarily in Iran and Europe through espionage-focused malware like Foudre and Tonnerre. Previously SafeBreach Labs' research revealed the group never truly went dormant after 2022. ----- Key takeaways: 🧬 New Foudre-like v051 variant (Tornado?) PE timestamp: 2012-06-09 13:19:49, but only uploaded to VT on 2025-12-15 22:01:45 🌪️ Places a mutex named TornadoInstaller 🧾 Exfiltrates browser cookies, saved credentials 🕵️♂️ Checks whether ESET/NOD32 AV is installed 🛡️ Enumerates AntiVirusProduct, BIOS, CPU, BaseBoard information, and more 📋 Collects list of installed programs, copies clipboard content 📡 Sends all previous listed information to the C2 🤖 Capability to send the report to Telegram bot 🔀 Utilizes DGA and uses a set of 4 hardcoded TLDs (.ix[.]tc, .site, .space, .hbmc[.]net) ⛓️ Potentially use blockchain for C2 domains (BTC: 1HLoD9E4SDFFPDiYfNYnkBLQ85Y51J3Zb1) ----- IoCs (SHA256): 44fc9e306763774b50b61fc7487aa1d219aa288aefa201119c7bc278e17600a8 5db4ed7d07ab028ab6ceba8efec5f667d86a419020d2a8c86e90a3125aa31bb9 8db20544f280955ed3ef3c42dc8423e3000e244fc7c8f0e3a7567fa48f7a15d9 a05c2c042dc4f54daf69b1b1441aa938b0ffc6fe979c413bd9fcae95b0bf7542 b937024b7484b26d09ba8130cc4ab04600dc18c976bb0c7724a063f1fc6f0d77 ba16a2dddbae458d85e663a773bff2f6eeb8704b6111b0c748564f48424538e8 #cybersecurity #malwareanalysis #threatdetection #threatintelligence #threathunting
1 Kommentar Gefällt mir Kommentieren Teilen
-
VMRay
7.481 Follower:innen
1 Woche- Diesen Beitrag melden
🔎 From regional signal to global #ThreatIntelligence At the SANS Institute #CTI Summit (CTI in the #AI Arms Race), join a deep-dive session on Hydra Saiga (aka Yorotrooper) — a state-sponsored actor operating under the radar in Central Asia. https://lnkd.in/eQ9Q_Wg7 Shadows in the Steppe goes beyond attribution to unpack real post-exploitation tradecraft: - How custom and commodity #malware are blended to evade detection - What their C2 infrastructure and evasion techniques look like in practice - Why water and energy sectors remain consistent, strategic targets 🎙️ Presented by: Pol Thill (Independent Threat Researcher) & Hüseyin Fatih Akar (VMRay) A must-attend session for CTI professionals tracking advanced, geopolitically driven threat actors — especially in under-covered regions. #MalwareAnalysis #ThreatDetection #cybersecurity
Gefällt mir Kommentieren Teilen
-
VMRay hat dies direkt geteilt
Security-Insider
12.424 Follower:innen
1 Woche- Diesen Beitrag melden
Künstliche Intelligenz durchdringt und verändert die Cybersicherheit. Doch ersetzt die Erkennung von Angriffen durch Künstliche Intelligenz andere Verfahren wie Sandboxes oder werden Sandboxes in Zeiten von KI-basierter Cybersicherheit sogar noch mehr benötigt? Der aktuelle Videocast von Insider Research mit Dr. Carsten Willems von VMRay liefert Antworten.
Gefällt mir Kommentieren Teilen
-
VMRay
7.481 Follower:innen
1 Woche- Diesen Beitrag melden
📸 Moments from our 2026 Sales Kick-off in #Dubai: a strong start to 2026, with shared #ownership of where we’re going next. Over three packed days, our remote teams came together to align, challenge ideas, and build momentum for the year ahead. Alongside the strategy work, shared experiences in the desert — from dune bashing to camel rides — helped strengthen the human connections that make remote collaboration work. Huge thanks to the organizing team for creating an SKO that was both deeply insightful and genuinely fun. #TeamVMRAY #cybersecurity
-
-
-
-
-
+3
Gefällt mir Kommentieren Teilen
-
VMRay
7.481 Follower:innen
2 Wochen- Diesen Beitrag melden
🔎 New year, new threats — and sharper detection. https://lnkd.in/dUB7XvZH We’re kicking off 2026’s first Detection & Intelligence Highlights webinar with a deep dive into how modern #phishing campaigns are evolving — and how to detect them before they slip through. 📅 Jan 28 | 🎙️ Andrey Voitenko, CISSP & Ertugrul Kara 🧠 #Clickfix attacks unpacked — how browser-based social engineering and complex redirection chains evade traditional controls ☁️ Abuse of #SharePoint & #OneDrive — detecting multi-stage delivery hiding in trusted cloud infrastructure 🕵️ #MetaStealer config extraction — instantly pivot on C2 and infrastructure from real-world samples ⚙️ Automation in action — analyzing user-reported phishing emails via #KnowBe4 PhishER + VMRay If you work in CERT, SOC, or CTI, this session delivers practical detections and intelligence you can apply immediately. 👉 Register here: https://lnkd.in/dUB7XvZH #ThreatDetection #ThreatIntelligence #Phishing #SOC #CTI
Gefällt mir Kommentieren Teilen
-
VMRay
7.481 Follower:innen
2 Wochen- Diesen Beitrag melden
🚀 New Release: VMRay Platform 2026.1.0 — built for clarity, speed, and accuracy. https://lnkd.in/dWR8mC3x Security teams face increasingly complex delivery chains and stealthy #phishing tricks. Our new release delivers improvements that directly address those challenges: 🔍 Clearer #malware delivery chains — a redesigned "Relations" view makes it far easier to visualize parent/child relationships, URLs, clusters, and the full attack flow without hunting through nested lists. 📧 #Phishing workflows amplified — native integration with #KnowBe4 PhishER brings verdicts, classifications, and direct links to VMRay reports right into your phishing triage process. 📱 Smarter #QR code phishing detection — broader, more accurate decoding of obfuscated QR codes attackers use to hide malicious URLs. These updates mean less noise, faster insight, and deeper understanding of evasive threats — giving analysts and SOC teams the clarity they need to act with confidence. 👉 Explore the full release highlights: https://lnkd.in/dWR8mC3x #ThreatDetection #MalwareAnalysis #PhishingDetection #SOC #CTI #ThreatIntelligence
Gefällt mir Kommentieren Teilen
-
VMRay
7.481 Follower:innen
2 Wochen- Diesen Beitrag melden
🔥 Brazil #WhatsApp spam reloaded: multi-layer obfuscation with HTA and PowerShell We've recently spotted an attack chain that demonstrates a uniquely layered obfuscation scheme that resembles previous WhatsApp spam bot operations seen in Brazilian #phishing campaigns similar to STAC3150, known for distributing payloads such as the #infostealer #Astaroth through hijacked web sessions and social engineering. The attack begins with a malicious HTA carrier embedding a VBScript payload that’s both Base64-encoded and XOR-encrypted. Through five decryption rounds, each using a different XOR key, the final VBScript emerges and connects to the C2, retrieving a ZIP archive containing a next-stage PS1 loader and a MSI installer. The PowerShell component automates sending messages and payloads to WhatsApp Web using Selenium, Chrome, and the WPPConnect WA-JS library, while communicating with a remote PHP backend for configuration and telemetry. Key takeaways: - Initial HTA carrier contains Base64-obfuscated and XOR-encrypted (5 rounds) VBScript - Final VBScript pulls a ZIP archive from the C2, with embedded PS1 downloader and MSI installer - PowerShell loader drops wppconnect-wa.js, ChromeDriver and SeleniumModule for automating headless WhatsApp spam bot (whatsapp_automation_v6_robust.ps1) - PowerShell also pulls PDF with prefix "Orcamento-2025" (Budget-2025), mimicking legitimate invoice attachments for phishing - MSI installer deploys ConnectWise ScreenConnect RMM - Operation resembles previous Brazil WhatsApp spam ops without the Astaroth/Guildma payload
-
-
-
-
-
+1
2 Kommentare Gefällt mir Kommentieren Teilen
-
VMRay
7.481 Follower:innen
1 Monat- Diesen Beitrag melden
🎙️ Great conversation on #AI-driven #cybersecurity and the role of #sandboxing — thanks for sharing, Oliver Schonschek. In this podcast, our CEO Dr. Carsten Willems talks about what really matters as AI reshapes security operations: why sandboxing, deep behavioral analysis, and high-fidelity signals are becoming even more critical in an AI-powered security operations. If you’re thinking about how to separate signal from noise — for humans and AI — this is well worth a listen. ▶️ Watch the video: https://lnkd.in/gRqEHPtW 🎧 Or listen on your favorite podcast platform: https://lnkd.in/g5GMaTiY
Oliver Schonschek 1 Monat
Und hier ist sie, die Jubiläums-Folge des #Podcast Insider Research im Gespräch: Folge 250: Sandboxes und KI-basierte #Cybersicherheit, mit Dr. Carsten Willems von VMRay #Sandbox #KI #AI #Cybersecurity #Security #SOC #CERT, als Videocast und als Audio-Podcast https://lnkd.in/dMsaQKRT
Sandboxes und KI-basierte Cybersicherheit, mit Dr. Carsten Willems von VMRay
https://www.youtube.com/
Gefällt mir Kommentieren Teilen
Einfach anmelden, damit Sie nichts verpassen.
- Personen von VMRay finden, die Sie kennen
- Persönliche Jobempfehlungen erhalten
- Alle Updates, News und Artikel anzeigen
Ähnliche Seiten
-
PHYSEC GmbH
Computer- und Netzwerksicherheit
Bochum, Nordrhein-Westfalen
-
Joe Security LLC
Computer- und Netzwerksicherheit
Reinach, Baselland
-
CrowdStrike
Computer- und Netzwerksicherheit
-
Yttrium
Wagniskapital- und Private-Equity-Auftraggeber
Frankfurt am Main, Hessen
-
ANY.RUN
Computer- und Netzwerksicherheit
-
Proofpoint
Computer- und Netzwerksicherheit
Sunnyvale, California
-
Sophos
Softwareentwicklung
Abingdon, Oxfordshire
-
G DATA CyberDefense
Computer- und Netzwerksicherheit
Bochum, North Rhine-Westphalia
-
Intel 471
Sicherheits- und Ermittlungsdienste
-
Filigran
Computer- und Netzwerksicherheit
Jobs durchsuchen
-
Analyst-Jobs
54.870 freie Stellen -
Director-Jobs
73.946 freie Stellen -
Projektmanager-Jobs
15.641 freie Stellen -
Vertriebsingenieur-Jobs
16.350 freie Stellen -
CEO-Jobs
3.125 freie Stellen -
Junior-Controller-Jobs
1.026 freie Stellen -
Sicherheitsberater-Jobs
67 freie Stellen -
IT-Berater-Jobs
25.984 freie Stellen -
Redakteur-Jobs
1.462 freie Stellen -
IT-Administrator-Jobs
9.513 freie Stellen -
Autor-Jobs
493 freie Stellen -
Direktor-Jobs
763 freie Stellen -
Controller-Jobs
10.281 freie Stellen -
Produktmanager-Jobs
4.466 freie Stellen -
Marketingleiter-Jobs
88 freie Stellen -
Entwickler-Jobs
21.496 freie Stellen -
IT-Leiter-Jobs
810 freie Stellen -
Business Analyst-Jobs
5.224 freie Stellen -
Ausbildungsleiter-Jobs
201 freie Stellen -
CFO-Jobs
1.398 freie Stellen
Finanzierung
VMRay Insgesamt 5 FinanzierungsrundenLetzte Runde
Serie B 19. Jan. 2023 Externer Crunchbase-Link für die letzte Finanzierungsrunde11.143.019,00 $
Investor:innen
-
- Analyst-Jobs
- Entwickler-Jobs
- Produktionsleiter-Jobs
- Recruiter-Jobs
- Texter-Jobs
- Redakteur-Jobs
- Autor-Jobs
- IT-Leiter-Jobs
- Director-Jobs
- Projektmanager-Jobs
- Vertriebsleiter-Jobs
- Marketingleiter-Jobs
- Vertriebsingenieur-Jobs
- Event-Manager-Jobs
- Social Media-Manager-Jobs
- Projektmanagement-Jobs
- Marketingassistent-Jobs
- CEO-Jobs
- Business Development-Jobs
- Account-Manager-Jobs
- HR-Manager-Jobs
- PHP-Entwickler-Jobs
- Sicherheitsingenieur-Jobs
- Innenarchitekt-Jobs
- Scrum Master-Jobs
- Direktor-Jobs
Zustimmen und LinkedIn beitreten
Wenn Sie auf „Weiter“ klicken, um Mitglied zu werden oder sich einzuloggen, stimmen Sie der Nutzervereinbarung, der Datenschutzrichtlinie und der Cookie-Richtlinie von LinkedIn zu.
Loggen Sie sich ein, um zu sehen, wen Sie bereits bei VMRay kennen.
E-Mail-Adresse/Telefon Passwort Einblenden Passwort vergessen? Einloggen Mit E-Mail einloggenoder
Neu bei LinkedIn? Mitglied werden
Wenn Sie auf „Weiter“ klicken, um Mitglied zu werden oder sich einzuloggen, stimmen Sie der Nutzervereinbarung, der Datenschutzrichtlinie und der Cookie-Richtlinie von LinkedIn zu.
Từ khóa » Vmray Gmbh Bochum
-
Contact Us: VMRay Malware Detection & Malware Analysis Company
-
VMRay - Cyber Security Threat Detection & Analysis Platform
-
VMRay - Crunchbase Company Profile & Funding
-
VMRay GmbH Company Profile | Competitors, Financials & Contacts
-
VMRay GmbH, Bochum, Germany - North Data
-
VMRay GmbH - Company Profile And News - Bloomberg Markets
-
Ihre Karriere Bei VMRay GmbH | StepStone
-
VMray GmbH - CyberDB
-
Vmray GmbH ▷ Software Hersteller In Bochum - Öffnungszeiten
-
[PDF] VMRay GmbH
-
VMRay - Startbase
-
VMRay Company Profile: Valuation & Investors - PitchBook
-
VMRay GmbH – Info Security Index
-
VMRay - PiPiWiki