Browsing tag

Malware analysis tools

Most Important Security Tools and Resources For Security Researcher and Malware Analyst

Security Professionals always need to learn many tools, techniques, and concepts to analyze sophisticated Threats and current cyber attacks. Hex Editors HxD 010 Editor Hex Workshop HexFiend Hiew Also Enroll:  Complete Ethical Hacking and Penetration Testing Course – Become a Professional Ethical Hacker Disassemblers IDA Pro Binary Ninja Radare Hopper Capstone objdump fREedom plasma Detection and […]

Automated Malware Analysis in the Cloud

Cybercriminals execute malware attacks using different attack vectors and using different methods. The number of malware strains is increasing in an unprecedented manner and hence malware analysis today is not an easy job. In the present context, automated malware analysis is a necessity. Let’s discuss today the different aspects of automated malware analysis in the […]

Best Ways to Remove Trojans, Malware and Viruses From Your Android Phone

According to MalwareBytes’s 2019 State of Malware Report, Trojans and crypto miners are the dominate malware threats of 2019. Android phones may get infected with malware less often than Windows computers, but that doesn’t mean they’re not vulnerable. With more consumers using mobile devices for more of their online activity, knowing how to remove Trojans […]

Malware Analysis Tools and Cheat list

A large number of computer intrusions involve some form of malicious software (malware), which finds its way to the victim’s workstation or to a server. When investigating the incident, the IT responder typically seeks to answer questions such as: What actions can the malware specimen perform on the system? How does it spread? How, if […]

LOG-MD – Log Malicious Detection tool

LOG-MD was designed for Windows based systems to audit log and advanced audit policy settings and guide users to enable and configure the audit settings to help push and encourage moving security and detection forward.  LOG-MD was also designed to gather the artifacts from malicious activity, referred to as “Malicious Discovery”, faster than the standard methods […]