Malware analysis February 20, 2015 Dejan Lukan Comparison of Cloud Automated Malware Analysis Tools In this section, we're providing a list of cloud automated online malware analysis tools that are not available anymore due to the website being offline or...
Malware analysis February 19, 2015 Security Ninja Gh0st RAT Part 2: Packet Structure and Defense Measures We have seen in Part 1 of this series how sophisticated Gh0st RAT is and how difficult it is to identify this attack because of the variants it comes in. In...
Malware analysis February 11, 2015 Security Ninja Gh0st RAT: Complete malware analysis – Part 1 In this article series, we will learn about one of the most predominant malware, named Gh0st RAT, whose source code is dated back to 2001 but it is still relevant...
Malware analysis January 27, 2015 Dejan Lukan Overview of Automated Malware Analysis in the Cloud Malicious attackers are constantly on the lookout for new and advanced attacks, which they use to spread malware around the world. There are a vast number of...
Malware analysis January 19, 2015 Shaman Vilen Tyupkin ATM Malware Analysis Some time ago, Kaspersky discovered and reported a new type of malicious program called Tyupkin, which targets ATM machines by moving beyond targeting consumers...
Malware analysis January 5, 2015 Pavitra Shankdhar SoakSoak Malware and How to Protect Your WordPress Website If you follow security news, I am sure you have heard of SoakSoak malware. It has been in the news for the past few days because it affects more than 100,000+...
Malware analysis December 26, 2014 Shaman Vilen Evolution of Banking Malwares, Part 2 This technique is used in scenarios where critical information such as Social Security Number (SSN) or Personal Identification Number (PIN) is otherwise not...
Malware analysis December 24, 2014 Shaman Vilen Evolution of Banking Malwares, Part 1 Why are malware authors so interested in banking malware? Simply because this is where the money is! Nowadays, banking malware, specifically banking Trojans,...
Malware analysis December 22, 2014 Emanuele De Lucia Pattern-Based Approach for In-Memory ShellCodes Detection Introduction During an analysis, it can be really useful to know some common instructions with which malware, and more specifically shellcodes, achieve their...
Malware analysis December 1, 2014 Pierluigi Paganini Regin: State-Sponsored Malware or Cybercrime? A few weeks ago, Symantec security firm published the results of its investigation on the backdoor Regin, a highly advanced spying tool used in cyber espionage...