April 23, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Tag Archives: malware hunting (page 4)

Tag Archives: malware hunting

Books

Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer

Cisco Press has announced a new book by Joseph Muniz and Aamir Lakhani entitled “Investigating the Cyber Breach: The D…

Software

The new version of Mandiant Redline supports Windows 10

Redline version 1.20 introduces support for collection from and analysis of Window 10 systems and is already available for d…

Articles

Basic Dynamic Analysis of a Malicious VBScript

For a long time one of the most common sources of ransomware and other malware have been spear phishing emails. Such emails …

How To

How to Find Data Hidden at the End of an OLE File

Philippe Lagadec has published a blog post on how to find data hidden at the end of an OLE file. You will learn about&n…

News

APT29 Domain Fronting With TOR

Matthew Dunwoody from FireEye has published a research on how Russian nation-state attackers APT29 employing domain fro…

Software

FAME – open-source malware analysis framework

FAME is an open source malware analysis platform that is meant to facilitate analysis of malware-related files, leveraging a…

Tips & Tricks

Is Fileless Malware Really Fileless?

Travis Smith has published a post about fileless malware on The State of Security. He notes that this type of malware isn…

Webinars

Decoding Malicious .vbs Scripts

Guys from Open Analysis have published a video of walking through manually decoding a malicious vbs script that was submitte…

How To

Analyzing Obfuscated Scripts Using Nothing But a Text Editor

NVISO Labs has published a blog post about analysis of some obfuscated scripts that they received. These file…

Software

Build malware analysis Windows VMs with Malboxes

Malboxes by GoSecure will build malware analysis Windows VMs for you so that you don’t have to. To learn more about th…

Page 4 of 6First...23456

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account