Malicious Software
I’ve been continually expanding and sharing my expertise related to curtailing the effects of malware on enterprise environments, especially in the context of digital forensics and incident response.
What malware analysis approaches work well? Which don't? How are the tools and methodologies evolving? The following...Read more
If you'd like to start experimenting with malware analysis in your own lab, here's how to download and set up a free...Read more
The language of cybersecurity evolves in step with changes in attack and defense tactics. You can get a sense for such...Read more
I'm always on the quest for real-world malware samples that help educate professionals how to analyze malicious software....Read more
CrowdStrike acquired Payload Security, the company behind the automated malware analysis sandbox technology Hybrid...Read more
This cheat sheet outlines tips for reversing malicious Windows executables via static and dynamic code analysis with the...Read more
"Zero-day" is the all-powerful boogieman of the information security industry. Too many of us invoke it when discussing...Read more
What's the deal with "fileless malware"? Though many security professionals cringe when they hear this term, lots of...Read more
Update: The following post was published in February 2017. After an amazing and fruitful adventure at Minerva Labs, I've...Read more
Malware that encrypts and holds files at ransom can have devastating effects on personal documents, customer data and...Read more