VMware VMware Security Blog
  • VMware Blogs
  • Communities
  • Tech Zone
  • RSS
  • Featured
  • Categories
    • Announcements
    • Executive Viewpoint
    • Multi-Cloud Security
    • Modern Apps Security
    • Workload Security
    • Endpoint Security
    • Network Security
    • Threat Analysis Unit
    • VMware Security Response Center
  • VMware Security
  • Get A Demo
  • RSS
Why CISOs Should Invest More Inside Their Infrastructure
Misc

Why CISOs Should Invest More Inside Their Infrastructure

Tom Gillis June 2, 2022 5 min read
Serpent - The Backdoor that Hides in Plain Sight
Misc

Serpent - The Backdoor that Hides in Plain Sight

Threat Analysis Unit April 25, 2022 11 min read
How Not to Build a SOC
Misc

How Not to Build a SOC

Martin Holzworth April 18, 2022 14 min read
Podcast: Discussing the latest security threats and threat actors - Tom Kellermann (Virtually Speaking)
Misc

Podcast: Discussing the latest security threats and threat actors - Tom Kellermann (Virtually Speaking)

Editorial Staff April 13, 2022 1 min read

Takahiro Haruyama

Sr. Threat Researcher @ VMware Carbon Black | Takahiro Haruyama is a reverse engineer with over ten years of extensive experience and knowledge in malware analysis and digital forensics. He has spoken at several famous conferences including REcon, HITB, HITCON, SECURE, DFRWS EU, SANS DFIR Summit, FIRST and BlackHat Briefings USA/Europe/Asia.

Author's Posts

Threat Analysis: Active C2 Discovery Using Protocol Emulation Part4 (Dacls, aka MATA)
Misc

Threat Analysis: Active C2 Discovery Using Protocol Emulation Part4 (Dacls, aka MATA)

Takahiro Haruyama November 21, 2022 5 min read
Threat Analysis: Active C2 Discovery Using Protocol Emulation Part3 (ShadowPad)
Misc

Threat Analysis: Active C2 Discovery Using Protocol Emulation Part3 (ShadowPad)

Takahiro Haruyama October 27, 2022 21 min read
Monitoring Winnti 4.0 C2 Servers for Two Years
Misc

Monitoring Winnti 4.0 C2 Servers for Two Years

Takahiro Haruyama November 15, 2021 3 min read
Detecting UEFI Bootkits in the Wild (Part 1)
Misc

Detecting UEFI Bootkits in the Wild (Part 1)

Takahiro Haruyama June 15, 2021 13 min read
Detecting Threats in Real-time With Active C2 Information
Misc

Detecting Threats in Real-time With Active C2 Information

Takahiro Haruyama, Omar Elgebaly September 22, 2020 6 min read
Threat Analysis: Active C2 Discovery Using Protocol Emulation Part2 (Winnti 4.0)
Misc

Threat Analysis: Active C2 Discovery Using Protocol Emulation Part2 (Winnti 4.0)

Takahiro Haruyama February 21, 2020 25 min read
Active C2 Discovery Using Protocol Emulation Part1 (HYDSEVEN NetWire)
Misc

Active C2 Discovery Using Protocol Emulation Part1 (HYDSEVEN NetWire)

Takahiro Haruyama November 20, 2019 14 min read
CB TAU Threat Intelligence Notification: Winnti Malware 4.0
Misc

CB TAU Threat Intelligence Notification: Winnti Malware 4.0

Takahiro Haruyama September 4, 2019 15 min read
fn_fuzzy: Fast Multiple Binary Diffing Triage with IDA
Misc

fn_fuzzy: Fast Multiple Binary Diffing Triage with IDA

Takahiro Haruyama May 9, 2019 13 min read
Defeating Compiler-Level Obfuscations Used in APT10 Malware
Misc

Defeating Compiler-Level Obfuscations Used in APT10 Malware

Takahiro Haruyama February 25, 2019 28 min read