Explore our cybersecurity resource library, including case studies, whitepapers, best practices and expert thought leadership.Learn More >
From a forensics standpoint, our trained experts will use the most advanced technology and analysis methods.
Our malicious file analysis often leads to the identification of indicators of compromise (IOCs), such as IP addresses or domains communicating with the malware, Microsoft registry key modifications, identification of child or sub-processes that have been launched, code injections, and file names or other attributes of not just the malicious payloads, but the related affected files as well. With this information, we can help you track down other instances of the attack on other systems or put preventative measures in place to block them from happening going forward.
One PPG Place, Suite 1700
Pittsburgh, PA 15222
p: 412.261.3644 f: 412.261.4876
65 East State Street, Suite 2000
Columbus, OH 43215
p: 614.621.4060 f: 614.621.4062
1660 International Drive
McLean, VA 22102