Malicious Software
If you are looking to get started with malware analysis, tune into the webcast series I recorded to illustrate key tools...Read more
Examining malicious software involves a variety of tasks, some simpler than others. These efforts can be grouped into...Read more
I was one of the guests at the recent Forensic Lunch discussion, led by David Cowen. Here’s the video recording of the...Read more
When characterizing ill-effects of malicious software, it's too easy to focus on malware itself, forgetting that behind...Read more
Over the years, the set of skills needed to analyze malware has been expanding. After all, software is becoming more...Read more
There is much we can learn about coordinated online activities of skilled attackers with nation-state affiliations. The...Read more
In the past weeks I published several posts describing malware analysis tools and approaches at other blogs: Installing...Read more
Some organizations have encountered Advanced Persistent Threat over 5 years ago—earlier than most of us. Because of the...Read more
In the field of IT in general and digital forensics in particular, you become obsolete the moment you stop learning. Here...Read more
This post, published in February 2015, now captures a historical perspective at the term Indicators of Compromise (IOCs),...Read more