- Malware Analysis What to Include in a Malware Analysis Report
A malware analysis report should cover identification details (hashes, AV names), specimen characteristics and dependencies, behavioral and code analysis findings, supporting figures, and indicators...
- Assessments Tips for Creating a Strong Cybersecurity Assessment Report
Creating a strong security assessment report requires analyzing data beyond tool output, prioritizing findings by risk, documenting methodology and scope, and providing practical remediation...
- Communication Balancing Brevity and Verbosity in Business Communications
Brevity is valuable when audiences lack time or inclination—use elevator pitches for executives, SWOT matrices for pros and cons, and keep emails short. Verbosity is appropriate when responding to...
- Social Engineering The Need for Ethics When Researching Social Engineering
Studying social engineering helps strengthen defenses against persuasion-based attacks, but research must be conducted ethically. The term "con artist" glorifies fraud; social engineering without...
- Communication One-Year Anniversary of this Blog
- Malware The Use of the Modern Social Web by Malicious Software
Modern malware exploits the social web ecosystem: using social networking sites for command-and-control, controlling social media content for financial/political rewards, distributing links for...