Reverse Engineering Malware 101: Getting Started with macOS ReversingResearchReverse Engineering Malware 101: Getting Started with macOS ReversingGetting started with macOS malware reversing using open-source tools like Ghidra and Radare2.
A New Chapter at Stairwell: Welcoming Emmy Linder as CEOBlogsA New Chapter at Stairwell: Welcoming Emmy Linder as CEOStairwell welcomes Emmy Linder as CEO, marking a new phase in its cybersecurity mission.
Prometei Evolves: Stairwell identifies new variants and publishes 3 new YARA rulesResearchPrometei Evolves: Stairwell identifies new variants and publishes 3 new YARA rulesNew YARA rules released as Stairwell exposes 53 stealthy Prometei variants.
Detecting TodoSwiftResearchDetecting TodoSwiftDetect Swift-based macOS malware with our TodoSwift YARA rule and instant file search.
Are These 18 Malicious Browser Extensions on Your Organization’s Devices?ResearchAre These 18 Malicious Browser Extensions on Your Organization’s Devices?18 verified browser extensions were malware—Stairwell finds them on devices in seconds.
Detecting defendnot: A Tool for Silently Disabling Windows DefenderResearchDetecting defendnot: A Tool for Silently Disabling Windows DefenderStealthy tool disables Windows Defender via WSC API—Stairwell offers YARA rule for detection.
One Pager: Stairwell Intelligent AnalysisBriefs & sheetsOne Pager: Stairwell Intelligent AnalysisSupercharge your SOC with AI-driven alert triage, faster decisions, and zero added headcount.
One Pager: The Stairwell platformBriefs & sheetsOne Pager: The Stairwell platformLearn how the Stairwell platform can help protect your organization against advanced attacks.
Upleveling your security teamBriefs & sheetsUpleveling your security teamSee how security teams are outnumbered, overworked, and stuck with outdated tools.
Your current cybersecurity tools aren’t enoughBlogsYour current cybersecurity tools aren’t enoughWhy today’s cybersecurity tools fail and how Stairwell ensures nothing is missed.
SEC cyber disclosure rules: the demand for detailsBlogsSEC cyber disclosure rules: the demand for detailsNew SEC rules demand detailed cyber disclosures. Learn how companies are adapting for success.
Future-proofing your AI security strategyBlogsFuture-proofing your AI security strategyFuture-proof AI security with data models that detect threats attackers can’t evade.
Why automating SOC flows isn’t enough: It’s time to break down the silos in your security operationsBlogsWhy automating SOC flows isn’t enough: It’s time to break down the silos in your security operationsAutomation alone won't secure your SOC. Break down silos for a proactive, unified defense.
Proactive downgrade protection: Keeping your systems protected from hidden vulnerabilitiesResearchProactive downgrade protection: Keeping your systems protected from hidden vulnerabilitiesPrevent hidden threats with Stairwell’s Downdate downgrade protection system.
Hilbert curves: Visualizing binary files with color and patternsBlogsHilbert curves: Visualizing binary files with color and patternsVisualize binary files with Hilbert curves: Spot patterns, anomalies, and malware.