Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer
Cisco Press has announced a new book by Joseph Muniz and Aamir Lakhani entitled “Investigating the Cyber Breach: The D…
Cisco Press has announced a new book by Joseph Muniz and Aamir Lakhani entitled “Investigating the Cyber Breach: The D…
Redline version 1.20 introduces support for collection from and analysis of Window 10 systems and is already available for d…
For a long time one of the most common sources of ransomware and other malware have been spear phishing emails. Such emails …
Philippe Lagadec has published a blog post on how to find data hidden at the end of an OLE file. You will learn about&n…
Matthew Dunwoody from FireEye has published a research on how Russian nation-state attackers APT29 employing domain fro…
FAME is an open source malware analysis platform that is meant to facilitate analysis of malware-related files, leveraging a…
Travis Smith has published a post about fileless malware on The State of Security. He notes that this type of malware isn…
Guys from Open Analysis have published a video of walking through manually decoding a malicious vbs script that was submitte…
NVISO Labs has published a blog post about analysis of some obfuscated scripts that they received. These file…
Malboxes by GoSecure will build malware analysis Windows VMs for you so that you don’t have to. To learn more about th…
Login