Search Results for: reverse engineering Knowledge Center DearCry Ransomware Malware Analysis and Reverse Engineering April 8, 2021 The goal of this paper is to provide a deep analysis of DearCry ransomware and demonstrate some techniques of malware... Blog Post What Is Obfuscation In Security And What Types of Obfuscation Are There? November 26, 2020 Obfuscation is a mighty technique widely used by hackers as well as security teams all over the globe. They have... Knowledge Center Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is... Blog Post What is Malware Analysis/Malware Reverse Engineering? February 26, 2019 Most people know the process of software design, programming or scripting. They use their favorite IDE (Integrated Development Environment) to either... Blog Post Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and... Blog Post Latest Siemens PLC Vulnerability Could Let Hackers Execute Malicious Code Remotely June 23, 2021 Siemens ProductCERT recently released a Security Advisory warning of a memory protection bypass vulnerability present in its SIMATIC S7-1200 and... Knowledge Center Clipper AutoIt v2 – QUILCLIPPER AutoIt Malware July 1, 2020 Overview. During a recent engagement, the LIFARS DFIR Team discovered a sample of rare malware, which uses not very common techniques. It turns out that... Blog Post Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They... Blog Post Top Penetration Testing Certifications May 30, 2020 To be a penetration tester, you should always start with other IT and tech careers, such as general IT, but... Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... Blog Post Hacking with Artificial Intelligence December 17, 2019 Artificial intelligence (AI) have entered the everyone’s life, and we can see many AI-related products everywhere, such as Siri, AI... Blog Post What is Penetration Testing? January 29, 2020 Penetration testing is a type of security testing that evaluates an organization’s ability to protect its application, network, system, and... Blog Post Open Source and Free Tools for Incident Response Teams November 26, 2019 LIFARS Incident and Response team uses multiple tools when responding to and investigating incidents. For new and upcoming enthusiasts and... Blog Post From Dridex to BitPaymer Ransomware to DoppelPaymer……The Evolution November 21, 2019 Evil Corp, also known as INDRIK SPIDER and TA505, released BitPaymer ransomware in 2017, after hitting some obstacles with Dridex.... Blog Post Underminer Exploit Kit Delivers Crypto Mining Malware and Bootkit July 31, 2018 A new exploit kit dubbed Underminer has been discovered to spread through advertising servers delivering bootkits targeting system boot sectors...
Knowledge Center DearCry Ransomware Malware Analysis and Reverse Engineering April 8, 2021 The goal of this paper is to provide a deep analysis of DearCry ransomware and demonstrate some techniques of malware...
Blog Post What Is Obfuscation In Security And What Types of Obfuscation Are There? November 26, 2020 Obfuscation is a mighty technique widely used by hackers as well as security teams all over the globe. They have...
Knowledge Center Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is...
Blog Post What is Malware Analysis/Malware Reverse Engineering? February 26, 2019 Most people know the process of software design, programming or scripting. They use their favorite IDE (Integrated Development Environment) to either...
Blog Post Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and...
Blog Post Latest Siemens PLC Vulnerability Could Let Hackers Execute Malicious Code Remotely June 23, 2021 Siemens ProductCERT recently released a Security Advisory warning of a memory protection bypass vulnerability present in its SIMATIC S7-1200 and...
Knowledge Center Clipper AutoIt v2 – QUILCLIPPER AutoIt Malware July 1, 2020 Overview. During a recent engagement, the LIFARS DFIR Team discovered a sample of rare malware, which uses not very common techniques. It turns out that...
Blog Post Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They...
Blog Post Top Penetration Testing Certifications May 30, 2020 To be a penetration tester, you should always start with other IT and tech careers, such as general IT, but...
Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous...
Blog Post Hacking with Artificial Intelligence December 17, 2019 Artificial intelligence (AI) have entered the everyone’s life, and we can see many AI-related products everywhere, such as Siri, AI...
Blog Post What is Penetration Testing? January 29, 2020 Penetration testing is a type of security testing that evaluates an organization’s ability to protect its application, network, system, and...
Blog Post Open Source and Free Tools for Incident Response Teams November 26, 2019 LIFARS Incident and Response team uses multiple tools when responding to and investigating incidents. For new and upcoming enthusiasts and...
Blog Post From Dridex to BitPaymer Ransomware to DoppelPaymer……The Evolution November 21, 2019 Evil Corp, also known as INDRIK SPIDER and TA505, released BitPaymer ransomware in 2017, after hitting some obstacles with Dridex....
Blog Post Underminer Exploit Kit Delivers Crypto Mining Malware and Bootkit July 31, 2018 A new exploit kit dubbed Underminer has been discovered to spread through advertising servers delivering bootkits targeting system boot sectors...