The PolySwarm Blog

Analyze suspicious files and URLs, at scale, millions of times per day. Get real-time threat intel from a crowdsourced network of security experts and antivirus companies competing to protect you.

URL Scanning now available in PolySwarm

Aug 29, 2019 1:07:20 PM / by PolySwarm Team posted in Explained, PolySwarm, Product, Threat Bounty

0 Comments

The PolySwarm marketplace launched earlier this year, giving users the ability to gain intelligence on files from a competitive network of crowdsourced scanning engines from around the world. Now, PolySwarm users also have access to real-time information on suspect URLs, domains, and IPs.

Read More

Keynote from PolySwarm CTO at DEF CON: Blockchain-Security Symbiosis

Aug 20, 2019 4:20:04 PM / by PolySwarm Team posted in Explained, PolySwarm, Blockchain, Threat Bounty, Speaking, Events

0 Comments

Cybersecurity and blockchain technology share a symbiotic relationship. On one hand, blockchain ecosystems that aren’t secure, aren’t useful. On the other hand, blockchain technology unlocks new options for securing systems, infrastructure and more.
 
PolySwarm Co-Founder and CTO Paul Makowski was invited to give the Day 2 Keynote talk at DEF CON Blockchain Village (2019) in Las Vegas. DEF CON (which follows on the heels of Black Hat) is one of the most well-known hacker conferences in the world, bringing together security researchers, cybersecurity experts, and other infosec people from around the world. Makowski presented
a thought-provoking talk examining blockchain and security from both sides of the coin: a look back at advances (and missteps) in securing blockchains and a look forward to security applications of blockchain technology. Watch the full presentation here: 
Read More

Welcome to the PolySwarm Blog

Aug 19, 2019 7:25:00 PM / by PolySwarm Team posted in Insider, Media, PolySwarm

0 Comments

PolySwarm started out with Medium as its content publishing tool. We created great, informative content; from stories on what it's like to be a woman in cybersecurity, to deep dives into technical topics like the 'commit and reveal scheme' on blockchain (and how its leveraged on PolySwarm). Recently, we created a new blog within the PolySwarm's web ecosystem, blog.polyswarm.io. This is where we will be publishing content moving forward. 

Read More

"A legitimately fascinating concept": Risky Business podcast on the PolySwarm marketplace

Aug 14, 2019 12:31:35 PM / by Anna Keeve posted in Interview, Press, Media, Explained, PolySwarm

0 Comments

“It’s a legitimately fascinating concept…kind of like bug bounties for both incumbent and niche AV engines.” This is what Patrick Gray said recently about cybersecurity startup PolySwarm on his podcast Risky Business.

Read More

Video: An interview with PolySwarm CEO on the PolySwarm marketplace

Aug 13, 2019 7:49:17 PM / by PolySwarm Team posted in Interview, Press, Media, PolySwarm, Leadership, Blockchain

0 Comments

Steve Bassi talks to BlockTempo TV about PolySwarm’s threat detection marketplace, a VirusTotal alternative that provides intelligence on malicious files and URLs.  Bassi talk here about how PolySwarm can help curb cybercrime, plus his thoughts on the WannaCry attack and what blockchain projects need to be successful in 2019 and beyond.

Read More

PolySwarm at Black Hat / DEF CON 2019: Keynote speaker + VIP party

Aug 1, 2019 1:00:00 PM / by PolySwarm Team

0 Comments

 

Read More

Using PolySwarm Threat Hunting and Metadata Searching for intel on 0-days

Jul 29, 2019 8:29:00 PM / by Katherine Yan and Javier Botella Fernandez posted in PolySwarm, Product, Threat Hunting

0 Comments

A deep dive into using PolySwarm’s hunting features to identify malware. This demonstration shows how Threat Hunting and Metadata Searching helps analysts gather info on 0-day malware using EvilGnome as an example.

Read More

Introducing the first ever 'threat bounty'

Jun 30, 2019 10:13:00 PM / by Anna Keeve posted in Explained, PolySwarm, Product

0 Comments

PolySwarm’s threat detection marketplace has created the possibility of a new type of cyber-related bounty: say hello to the threat bounty

 

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

See all

Recent Posts