Malware research studio · London ↔ Riyadh

Malware detection rewritten for relentless campaigns.

Sandgates hunts novel payloads, fingerprints adversarial tradecraft, and feeds decisive threat intelligence directly into your SOC before outbreaks land.

Live detonation trails, genome-grade labeling, and AI copilots translating findings in plain language.

Research-grade rigor, operator-ready outputs.

214k

Malware specimens reverse engineered inside Sandgates labs.

36 min

Average time from wild sample to verified intel brief.

2 hubs

Joint malware observatories operating out of London and Riyadh.

Detection Stack

Threat intelligence engines built in the lab, hardened in the wild.

Every layer fuses reverse engineering, automation, and narrative intelligence so your teams always see the next mutation coming.

Huntstream Atlas

Continuously ingests multi-cloud telemetry, isolates anomalies, and detonates artifacts within AI-curated sandboxes.

  • Behavioral clustering across languages
  • Memory forensics with replay
  • Shareable TTP manifests

Obsidian Bench

Research workbench where we pair reverse engineers with copilots to label code genomes and predict exploit chains.

  • Explainable disassembly summaries
  • Cross-compiled payload synthesis
  • Redacted partner notebooks

Signal Relay

Finished intelligence layer that briefs CISOs, SOC commanders, and policy leaders with actionable guidance.

  • Daily adversary situation reports
  • Machine-ready ingest feeds
  • Executive-ready narratives

Sandgates Labs

Research houses obsessed with malware truth.

Our dual-city labs run continuous capture programs, publish private dossiers, and ship applied research straight into production defenses.

Reverse First

Every engagement starts with fresh reversing, not recycled intel feeds.

Research Ops

Co-located analysts and AI copilots draft reports in hours, not weeks.

Embedded Guild

London and Riyadh cells embed with your SOC to translate findings on site.

Signals we track endlessly

  • Payload Provenance

    Ledger-backed lineage shows how each binary mutated across regions.

  • Command & Control

    Real-time takedown data maps the operator infrastructure behind every campaign.

  • Frontier Exploits

    AI systems stress-test LLMs and OT equipment for the same primitives attackers seek.

Research Spine

Methodical, relentless, peer-reviewed.

  1. Phase 01 · Reconnaissance

    Threat hunters capture samples from financial, energy, and public sector partners.

  2. Phase 02 · Lab Trials

    London and Riyadh researchers run sandboxes, publish signatures, and validate mitigations.

  3. Phase 03 · Field Dispatch

    Intel teams deploy copilots into your SOC with tailored response playbooks.

Need decisive malware intel?

Share the indicators you are seeing. We will align a research cell and start reversing within the hour.

Get in touch