Novetta’s Jennifer Reed, Director of Product Management, discusses what makes Novetta Entity Analytics unique. In this three part series discover the importance of unstructured content, relationship understanding, and scalability in your analysis.
Novetta improves authentication mechanisms for enterprise information systems through continuous validation of behavioral and cognitive modalities based on user-device interactions.
Novetta’s biosynethic software creates realistic biosynthetic fingerprints, face and iris image datasets.
Novetta’s Materials Lab offers a variety of capabilities in spoofing research ensuring that next generation biometric devices are not defeated by false presentations in malicious attacks.
This report includes key findings, background of the Operation SMN effort and its intended goals, some preliminary data on its impact, analysis of campaign targets, operational practices of Axiom as well as some strategic analysis of potential motivations and groups behind the tasking of Axiom actors.
This reverse engineering report outlines the capabilities of newer versions of Winnti that were observed during Operation SMN, including details on the malware’s start-up sequence, basic capabilities, and C2 communication protocol.
This report outlines in detail the full known lineage and capabilities of the HiKit malware family as it is known to Novetta and the Operation SMN coalition.
This list contains hashes of Winnti samples that can be found in VirusTotal.
This report outlines in detail the functioning of the ZoxPNG member of the Zox family, and includes some preliminary analysis of ZoxRPC a relative of ZoxPNG malware.