Malware analysis

Malware analysis
Introduction Malware is a popular term used to classify software with bad proposes that is part of our lives these days. Ghimob Trojan Banker is one of th

March 03, 2021
Pedro Tavares
Malware analysis
The number of threats attacking Linux systems have exploded in recent days. Within this context, a botnet that impacted several countries in the past, includ

February 17, 2021
Pedro Tavares
Malware analysis
The Vizom Trojan is an active piece of malware targeting online banking users in Brazil that takes advantage of the window overlay technique to steal user’s

February 10, 2021
Pedro Tavares
Malware analysis
RansomExx is the new malware used by criminals to attack both Windows and Linux environments. With companies using a mixed environment of Windows and Linux s

January 20, 2021
Pedro Tavares
Malware analysis
Introduction Data encryption malware is one of the most popular malware families in recent years and targets mass volumes of users and companies around the

January 06, 2021
Pedro Tavares
Malware analysis
Introduction Malware is a threat that has increased exponentially in the last few years, with many sophisticated threads impacting citizens, devices, organi

December 30, 2020
Pedro Tavares
Malware analysis
Introduction BlindingCan is a recent malware that has made headlines in the last few months. This malware is used by government-backed hackers from North Ko

December 16, 2020
Pedro Tavares
Malware analysis
Introduction Emotet is a self-propagating and modular Trojan first discovered in 2014 and a popular cyberthreat out in the world. It was initially developed

December 15, 2020
Pedro Tavares
Malware analysis
Introduction Octopus Scanner appeared somewhere in 2018. Although its creators are still unknown, the operation of Octopus Scanner has been extensively disc

December 09, 2020
Daniel Dimov
Malware analysis
Introduction WastedLocker is the name of a data encryption malware, also called ransomware, which will be analyzed in this article. Systems infected with th

December 02, 2020
Pedro Tavares- Exam Pass Guarantee
- Live expert instruction
- Hands-on labs
- CREA exam voucher
In this series
- How AsyncRAT is escaping security defenses
- Chrome extensions used to steal users' secrets
- Luna ransomware encrypts Windows, Linux and ESXi systems
- Bahamut Android malware and its new features
- LockBit 3.0 ransomware analysis
- AstraLocker releases the ransomware decryptors
- Analysis of Nokoyawa ransomware
- Goodwill ransomware group is propagating unusual demands to get the decryption key
- Dangerous IoT EnemyBot botnet is now attacking other targets
- Fileless malware uses event logger to hide malware
- Nerbian RAT Using COVID-19 templates
- Popular evasion techniques in the malware landscape
- Sunnyday ransomware analysis
- 9 online tools for malware analysis
- Blackguard malware analysis
- Behind Conti: Leaks reveal inner workings of ransomware group
- ZLoader: What it is, how it works and how to prevent it | Malware spotlight [2022 update]
- WhisperGate: A destructive malware to destroy Ukraine computer systems
- Electron Bot Malware is disseminated via Microsoft's Official Store and is capable of controlling social media apps
- SockDetour: the backdoor impacting U.S. defense contractors
- HermeticWiper malware used against Ukraine
- MyloBot 2022: A botnet that only sends extortion emails
- Mars Stealer malware analysis
- How to remove ransomware: Best free decryption tools and resources
- Purple Fox rootkit and how it has been disseminated in the wild
- Deadbolt ransomware: The real weapon against IoT devices
- Log4j - the remote code execution vulnerability that stopped the world
- Rook ransomware analysis
- Modus operandi of BlackByte ransomware
- Emotet malware returns
- Mekotio banker trojan returns with new TTP
- Android malware BrazKing returns
- Malware instrumentation with Frida
- Malware analysis arsenal: Top 15 tools
- Redline stealer malware: Full analysis
- A full analysis of the BlackMatter ransomware
- A full analysis of Horus Eyes RAT
- REvil ransomware: Lessons learned from a major supply chain attack
- Pingback malware: How it works and how to prevent it
- Android malware worm auto-spreads via WhatsApp messages
- Malware analysis: Ragnarok ransomware
- Taidoor malware: what it is, how it works and how to prevent it | malware spotlight
- SUNBURST backdoor malware: What it is, how it works, and how to prevent it | Malware spotlight
- ZHtrap botnet: How it works and how to prevent it
- DearCry ransomware: How it works and how to prevent it
- How criminals are using Windows Background Intelligent Transfer Service
- How the Javali trojan weaponizes Avira antivirus
- HelloKitty: The ransomware affecting CD Projekt Red and Cyberpunk 2077
- DreamBus Botnet: An analysis
- Kobalos malware: A complex Linux threat
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!