- Social Engineering Attackers Rely on Social Engineering to Activate Macros in Malicious Documents
Malicious document authors persuade victims to enable macros by claiming the security warning indicates protected content or by providing detailed step-by-step instructions for changing macro...
- Malware Analysis Version 5 Release of the REMnux Linux Distro for Malware Analysis
REMnux v5 adds tools for examining browser malware, document files, encoded artifacts, network interactions, and Linux specimens. New additions include Thug honeyclient, AnalyzePDF, XORStrings,...
- Social Engineering Scammers in Action: Domain Names and Family Resettlement to Australia
Scammers sent emails impersonating Australian immigration authorities to collect passport copies, photos, fingerprints, and personal details for identity theft. They used domain names with misleading...
- Malware Analysis A Series of Introductory Malware Analysis Webcasts
- Malware Analysis Mastering 4 Stages of Malware Analysis
Malware analysis techniques form a pyramid of increasing complexity: fully-automated analysis, static properties examination, interactive behavioral analysis, and manual code reversing. Analysts...
- Incident Response Speaking at the Forensic Lunch