Malware Analysis - Tagged - Security Boulevard
5 Steps for Secure Malware Analysis

5 Steps for Secure Malware Analysis

Avoid common pitfalls of malware analysis that could put you or your organization at risk with these 5 steps ...
Troystealer malware: What it is, how it works and how to prevent it | Malware spotlight

Troystealer malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
We are living in an era where malware is part of our daily lives. Emergent campaigns are increasing, each more sophisticated and harder to detect than the last. Malware can reveal itself ...

Fake STOP/DJVU decryptor malware: What it is, how it works and how to prevent it

| | Malware Analysis
Introduction Imagine a situation where criminals steal access to your property. They offer you a seemingly valid solution in the way of a tool that will give you your access back. But ...

Inside the Lyceum/Hexane malware

| | Malware Analysis
The Lyceum/Hexane Cybercrime Group Lyceum and Hexane are two industry designations for an APT group that was discovered in August 2019 and was operating without detection for at least a year and ...

Tycoon malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction It has been said that a picture is worth a thousand words. In the world of malware, a picture is worth an infection — in other words, a picture can actually ...

Top 5 ways ransomware is delivered and deployed

| | Malware Analysis
Introduction If your computer has not yet been affected by ransomware, odds are it could soon be. With ransom payments averaging more than $80,000 in Q4 2019, the coveted malicious software is ...

How to spot a malicious browser extension

| | Malware Analysis
Introduction Let’s not kid ourselves — the experience of surfing the web wouldn’t be the same without extensions. Browser extensions make it possible to block advertisements, change the appearance of... Go on ...
LockBit malware: What it is, how it works and how to prevent it | Malware spotlight

LockBit malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction LockBit is a data encryption malware in operation since September 2019 and a recent Ransomware-as-a-Service (RaaS), in which developers are in charge of the payment site and development... Go on to ...

Purple Fox malware: What it is, how it works and how to prevent it

| | Malware Analysis
Introduction Without question, there has been a marked die-off in the usage of Exploit Kits (EK). The Purple Fox exploit kit is a type of malware that is defying this recent trend ...

Ransomware deletion methods and the canary in the coal mine

| | Malware Analysis
Introduction  Ransomware is an emergent threat. Every week, there is a new and notable outbreak of this class of data encryption malware. From Ragnar Locker to Netwalker, the threats are increasing,... Go ...