Malware Analysis
5 Steps for Secure Malware Analysis
Avoid common pitfalls of malware analysis that could put you or your organization at risk with these 5 steps ...
Troystealer malware: What it is, how it works and how to prevent it | Malware spotlight
We are living in an era where malware is part of our daily lives. Emergent campaigns are increasing, each more sophisticated and harder to detect than the last. Malware can reveal itself ...
Fake STOP/DJVU decryptor malware: What it is, how it works and how to prevent it
Introduction Imagine a situation where criminals steal access to your property. They offer you a seemingly valid solution in the way of a tool that will give you your access back. But ...
Inside the Lyceum/Hexane malware
The Lyceum/Hexane Cybercrime Group Lyceum and Hexane are two industry designations for an APT group that was discovered in August 2019 and was operating without detection for at least a year and ...
Tycoon malware: What it is, how it works and how to prevent it | Malware spotlight
Introduction It has been said that a picture is worth a thousand words. In the world of malware, a picture is worth an infection — in other words, a picture can actually ...
Top 5 ways ransomware is delivered and deployed
Introduction If your computer has not yet been affected by ransomware, odds are it could soon be. With ransom payments averaging more than $80,000 in Q4 2019, the coveted malicious software is ...
How to spot a malicious browser extension
Introduction Let’s not kid ourselves — the experience of surfing the web wouldn’t be the same without extensions. Browser extensions make it possible to block advertisements, change the appearance of... Go on ...
LockBit malware: What it is, how it works and how to prevent it | Malware spotlight
Introduction LockBit is a data encryption malware in operation since September 2019 and a recent Ransomware-as-a-Service (RaaS), in which developers are in charge of the payment site and development... Go on to ...
Purple Fox malware: What it is, how it works and how to prevent it
Introduction Without question, there has been a marked die-off in the usage of Exploit Kits (EK). The Purple Fox exploit kit is a type of malware that is defying this recent trend ...
Ransomware deletion methods and the canary in the coal mine
Introduction Ransomware is an emergent threat. Every week, there is a new and notable outbreak of this class of data encryption malware. From Ragnar Locker to Netwalker, the threats are increasing,... Go ...

