- Malware Analysis What to Include in a Malware Analysis Report
A malware analysis report should cover identification details (hashes, AV names), specimen characteristics and dependencies, behavioral and code analysis findings, supporting figures, and indicators...
- Malware Analysis REMnux Usage Tips for Malware Analysis on Linux
REMnux provides a curated Linux environment for malware analysis, with tools organized by task: Windows PE analysis, Linux binaries, documents, network interactions, memory forensics, and data...
- Assessments Tips for Creating a Strong Cybersecurity Assessment Report
Creating a strong security assessment report requires analyzing data beyond tool output, prioritizing findings by risk, documenting methodology and scope, and providing practical remediation...
- Cheat Sheets How to Suck at Information Security - A Cheat Sheet
A tongue-in-cheek collection of common security mistakes to avoid: deploying products without tuning them, treating all assets with equal rigor regardless of risk, locking down infrastructure so...
- Assessments Information Security Assessment RFP Cheat Sheet
Effective security assessment RFPs require understanding what's driving the need, ensuring staff availability, and defining realistic timelines and budgets. Key elements include specifying assessment...
- Malware Analysis Free Malware Sample Sources for Researchers
A curated list of free sources where malware researchers can obtain samples for analysis, including MalwareBazaar, Hybrid Analysis, VirusShare, and vx-underground. Most require registration, and...