Malware analysis September 8, 2020 Nitesh Malviya Using Base64 for Malware Obfuscation What is Malware – Malware stands for malicious software and software, in simple language, means some program written in any programming language. So if a...
Malware analysis September 2, 2020 Greg Belding FlowCloud malware: What it is, how it works and how to prevent it I wish I could say that attack campaigns that target the United States energy sector do not exist, but unfortunately they do. The attack group behind the infamous...
Malware analysis August 27, 2020 Fakhar Imam Kaiji malware: What it is, how it works and how to prevent it | Malware spotlight Trend Micro recently reported that they have detected variants of two existing Linux OS botnet malware types, known as XORDDoS malware, that targeted exposed...
Malware analysis August 26, 2020 Daniel Brecht xHelper malware: What it is, how it works and how to prevent it | Malware spotlight Research shows malware spreading and directed specifically at mobile users. Check Point’s 2019 Mid-Year Trends Report shows that cyberattacks targeting smartphones...
Malware analysis August 25, 2020 Dimitar Kostadinov Analyzing Malware Network Behavior Analysis is a process of inspecting samples of a piece of malware to find out more about its nature, functionality and purpose. This in turn will create a...
Malware analysis August 19, 2020 Greg Belding ZLoader: What it is, how it works and how to prevent it | Malware spotlight It was once said that the apple doesn't fall far from the tree. In the case of the Zeus malware family, its fruit is known as ZLoader and it definitely has...
Malware analysis August 12, 2020 Greg Belding Zeus Sphinx: What it is, how it works and how to prevent it | Malware spotlight When something is described as “rising from the ashes,” the mythological creature known as the phoenix normally comes to mind. For those that research...
Malware analysis August 11, 2020 Greg Belding How to detect and prevent web shells: New guidance from the NSA and the Australian government It’s not every day that governments of different countries draft guidance rules about any subject together. It is even rarer that they create joint guidance...
Malware analysis August 5, 2020 Daniel Dimov Tesla Model 3 vulnerability: What you need to know about the web browser bug In 2020, Jacob Archuleta, a researcher nicknamed Nullze, discovered an important information security vulnerability on the web browser of the Tesla Model 3...
Malware analysis July 31, 2020 Richard Azu How to use Radare2 for reverse engineering This article defines reverse-engineering as it is used in the analysis of software. We will explain in detail how to use radare2 for reverse engineering. It...