How to Peel a PowerShell Onion: A Bloodhound Case Study

How to Peel a PowerShell Onion: A Bloodhound Case Study

Published May 2, 2022 Introduction Recently the GuidePoint Security DFIR team was called in to conduct an investigation for a […] ...
cybersecurity

Enterprise Malware Analysis Efforts are Lacking

Enterprises that realized their cybersecurity defenses will never be 100% effective against malware attacks have increasingly turned to threat hunting and malware analysis as part of their defense-in-depth strategy. According to a ...
Security Boulevard
5 Steps for Secure Malware Analysis

5 Steps for Secure Malware Analysis

Avoid common pitfalls of malware analysis that could put you or your organization at risk with these 5 steps ...
Troystealer malware: What it is, how it works and how to prevent it | Malware spotlight

Troystealer malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
We are living in an era where malware is part of our daily lives. Emergent campaigns are increasing, each more sophisticated and harder to detect than the last. Malware can reveal itself ...

Fake STOP/DJVU decryptor malware: What it is, how it works and how to prevent it

| | Malware Analysis
Introduction Imagine a situation where criminals steal access to your property. They offer you a seemingly valid solution in the way of a tool that will give you your access back. But ...

Inside the Lyceum/Hexane malware

| | Malware Analysis
The Lyceum/Hexane Cybercrime Group Lyceum and Hexane are two industry designations for an APT group that was discovered in August 2019 and was operating without detection for at least a year and ...

Tycoon malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction It has been said that a picture is worth a thousand words. In the world of malware, a picture is worth an infection — in other words, a picture can actually ...

Top 5 ways ransomware is delivered and deployed

| | Malware Analysis
Introduction If your computer has not yet been affected by ransomware, odds are it could soon be. With ransom payments averaging more than $80,000 in Q4 2019, the coveted malicious software is ...

How to spot a malicious browser extension

| | Malware Analysis
Introduction Let’s not kid ourselves — the experience of surfing the web wouldn’t be the same without extensions. Browser extensions make it possible to block advertisements, change the appearance of... Go on ...

Secure Guardrails