Malware analysis

Malware spotlight: EvilGnome

Introduction The name EvilGnome may conjure images of a malicious creature of folklore. Instead, this name actually refers to an emerging type of malware rec

Malware spotlight: Wabbit

Introduction Beginnings are often steeped in myth, legend and a good helping of storytelling, with malware being no exception to this rule. Way back in 1974,

Malware obfuscation, encoding and encryption

Malware is complex and meant to confuse. Many computer users think malware is just another word for “virus” when a virus is actually a type of malware. And

Malware spotlight: Hybrid malware

Introduction Hybrid malware, also known as combo malware, is a combination of two or more different types of attacks — usually a Trojan horse or worm with ad

Malware spotlight: Fileless malware

Introduction Fileless malware is a malicious technique that uses existing software, legitimate applications, operating system files and the authorized protoc

Malware Spotlight: What are Emotets?

Introduction  When some first hear the name Emotet, they may think they’re are hearing the name of the villain from the latest bad mummy movie. But Emotets m

Malware Spotlight: What is BabaYaga?

Introduction In traditional Slavic cultures, Baba Yaga is an entity that haunts the dreams of children and a common threat that parents use when their childr

Malware spotlight: Badware

Introduction: What is badware? Malware, as the name indicates, is malicious software designed to cause damage to computer systems and networks. Badware is o

Malware spotlight: What is a Remote Access Trojan (RAT)?

A Remote Access Trojan (RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remo

Malware spotlight: What is rogue security software?

Remember before you became security-conscious? Or maybe you always have been — either way, you most likely have been faced with this scenario. You sit down a