The Outlaw threat group is using a botnet to distribute a Monero cryptocurrency miner and a Perl-based backdoor component.
When AV software programs are designed independently, it is only natural that there is competition for resources in the zero-sum field in which they are playing.
The Emotet banking Trojan is making a comeback with new features and functions — but has the malicious code outsmarted itself?
A public malware sandbox can be a great substitute for an in-house malware analysis solution — as long as you understand its limitations.
Free malware analysis sandboxes can be used as a means of enhancing cybersecurity without a major drain on time, money and other resources.
With all the security breaches, it seems like cybercriminals keep getting through. Malware is evolving to evade detection by traditional defenses.
Sandboxing isn’t a new concept; it’s been used in various forms for some time. Application sandboxes add one more layer of defense in the struggle to regain the right to peaceful enjoyment in our own networks.
I am planning to do a blog series on Malware Analysis using the Zeus sample that I recently received in an email. The idea is not only to share what it does, but to focus mostly on sufficient details.