PrefaceMalware Analysis Techniques covers several topics relating to the static and behavioralanalysis of malware in the quest to understand the behavior, abilities, and goals ofadversarial software....
Category: MalWare
MANDIANT APT1 – Exposing One of Chinas Cyber Espionage Units
Since 2004, Mandiant has investigated computer security breaches at hundreds of organizations around the world. The majority of these security breaches are attributed to advanced threat...
Deception at Scale – How Malware Abuses Trust by VIRUSTOTAL
Welcome to the VirusTotalresearch report. We hope that by sharing our visibility into the threat landscape we can help researchers, security practitioners, and the public better...
Malware Analysis TIPS & TRICKS Poster by SANS DFIR
Uncovering the capabilities of malicious software allows security professionals to respond to incidents, fortify defenses, and derive threat intelligence. The malware analysis tips and tricks outlined...
A Deep Dive into Black Basta Ransomware by SecurityScorecard
Executive summaryBlack Basta ransomware is a recent threat that compiled its first malware samples in February The ransomware deletes all Volume Shadow Copies, creates a new...
Modern Malware for Dummies
IntroductionModern malware has transformed into highly sophisticated network applications and has, in the process,changed the world of enterprise security and how networks are attacked. These threats...
The 116 Best Cybersecurity Tools & Tactics 2021
If you want the best cybersecurity tools and tactics all in one place, you will love this guide.Below are the best 116 tools and tactics to...
Fireside chat: New ‘SASE’ weapon chokes off ransomware before attack spreads laterally
Fireside chat: New ‘SASE’ weapon chokes off ransomware before attack spreads laterallyIt’s stunning that the ransomware plague persists. Related: ‘SASE’ blends connectivity and security Verizon’s Data...