Malware Analysis
How to Peel a PowerShell Onion: A Bloodhound Case Study
Drew Schmitt | | Cybersecurity, GRIT, Incident Response & Threat Intelligence, Malware Analysis, powershell, Technical
Published May 2, 2022 Introduction Recently the GuidePoint Security DFIR team was called in to conduct an investigation for a […] ...
Enterprise Malware Analysis Efforts are Lacking
Enterprises that realized their cybersecurity defenses will never be 100% effective against malware attacks have increasingly turned to threat hunting and malware analysis as part of their defense-in-depth strategy. According to a ...
Security Boulevard
5 Steps for Secure Malware Analysis
Avoid common pitfalls of malware analysis that could put you or your organization at risk with these 5 steps ...
Troystealer malware: What it is, how it works and how to prevent it | Malware spotlight
We are living in an era where malware is part of our daily lives. Emergent campaigns are increasing, each more sophisticated and harder to detect than the last. Malware can reveal itself ...
Fake STOP/DJVU decryptor malware: What it is, how it works and how to prevent it
Introduction Imagine a situation where criminals steal access to your property. They offer you a seemingly valid solution in the way of a tool that will give you your access back. But ...
Inside the Lyceum/Hexane malware
The Lyceum/Hexane Cybercrime Group Lyceum and Hexane are two industry designations for an APT group that was discovered in August 2019 and was operating without detection for at least a year and ...
Tycoon malware: What it is, how it works and how to prevent it | Malware spotlight
Introduction It has been said that a picture is worth a thousand words. In the world of malware, a picture is worth an infection — in other words, a picture can actually ...
Top 5 ways ransomware is delivered and deployed
Introduction If your computer has not yet been affected by ransomware, odds are it could soon be. With ransom payments averaging more than $80,000 in Q4 2019, the coveted malicious software is ...
How to spot a malicious browser extension
Introduction Let’s not kid ourselves — the experience of surfing the web wouldn’t be the same without extensions. Browser extensions make it possible to block advertisements, change the appearance of... Go on ...