- Malware Analysis How to Get and Set Up a Free Windows VM for Malware Analysis
Setting up a malware analysis lab requires virtualization software, a Windows virtual machine, and the right tools. Microsoft offers free Windows 10 VMs that expire after 90 days, and utilities like...
- Training A Cybersecurity Writing Course for You
Strong writers find openings to their readers' hearts and minds by knowing how to structure and present content. Techniques like strategic use of headings, lists, and figure captions can help...
- Malware The Language and Nature of Fileless Attacks Over Time
The term "fileless" originated in 2001 to describe malware that existed solely in memory, but has expanded to encompass malicious documents, scripts, living-off-the-land techniques, and memory...
- Malware Making Sense of Microsoft's Endpoint Security Strategy
Microsoft is pursuing three endpoint security objectives: protecting the OS through baseline measures, motivating other vendors to innovate beyond commodity controls, and expanding enterprise revenue...
- Malware Retired Malware Samples: Everything Old is New Again
Legacy malware samples—like IRC-based backdoors with hidden backdoors, nuisance web pages that spawn endless windows, and Flash ads that hijack clipboards—demonstrate techniques that persist in...
- Social Engineering Scammers Use Breached Personal Details to Persuade Victims
Scammers include personal details from data breaches—such as passwords or phone numbers—in fraudulent messages to "prove" they have compromising information about their victims. These mass-mailed...