Malware analysis

What Are Packed Executables?

Introduction The battle between cybersecurity and malicious files is ever-changing, as the goalposts are always being moved. Whenever analysts figure out a w

Top 13 popular packers used in malware

Malware can wreak havoc on just about any system, and packers help malware stay one step ahead of security software. But what exactly do packers do? How can

Malware spotlight: Ekans

Introduction Industrial Control Systems, or ICS, have been the target of malware for some time now. Most of these threats target Windows systems and Windows

Virtualization-based sandbox malware

Introduction Sandboxing is well known for its ability to execute code safely without potential malicious effects afflicting a system. They are normally used

Jackpotting malware

Introduction Jackpotting malware is not well known because it exclusively targets automated teller machines (ATMs). This means it usually doesn’t directly af

Maze ransomware

Introduction One of the many recurring themes in cybersecurity echoes one of the great mottos in life of “the only thing constant is change.” Ransomware is n

What is Malware Obfuscation?

Introduction Malware has been a threat to companies and individuals since the 1970s, when the Creeper virus was first discovered. Since then, the globe has f

Debugging Basics

Introduction  The journey to coding mastery will come with a few bumps in the road. Some can be easily resolved by taking a closer look at the code. Others,

Reverse engineering and malware analysis tools

Reverse-engineering and malware analysis tools have an important role to play in terms of cybersecurity. For example, app developers and security teams can i

Malware spotlight: Droppers

There’s a cloud of confusion around droppers. Often seen as a sort of helper program in a cyberattack, droppers are actually a type of malware that plays an