Search Results for: malware analysts Blog Post What are the differences between Static, Dynamic and Hybrid Malware Analysis? November 4, 2020 In 2019, 114 million new malware applications were detected. 43 million new threats were already picked up in the first... Blog Post LIFARS Voltaire – New Open Source Tool for Cyber Incident Response Triage March 10, 2020 LIFARS, the global leader in Incident Response, Digital Forensics, Ransomware Mitigation and Cyber Resiliency Services, has released a new open-source... Knowledge Center Ransomware Fix and Cyber Vaccines – Malware Analysis of Dridex, BitPaymer and DoppelPaymer campaign November 27, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex (Evil Corp)... Blog Post What is Malware Analysis/Malware Reverse Engineering? February 26, 2019 Most people know the process of software design, programming or scripting. They use their favorite IDE (Integrated Development Environment) to either... Blog Post Open Source and Free Tools for Incident Response Teams November 26, 2019 LIFARS Incident and Response team uses multiple tools when responding to and investigating incidents. For new and upcoming enthusiasts and... Blog Post How to Strengthen Your Security by Adopting a More Proactive Posture July 29, 2021 Most organizations today invest heavily in reactive measures in an effort to shore up their security against a growing landscape... Blog Post LIFARS expert at the Summer School of Cybercrime September 18, 2020 CSIRT-UPJS – a security team from the University of Pavol Jozef Šafárik in Košice, Slovakia has organized the third Summer School... Blog Post Why You’re Lacking Adequate Security Event Logs and How to Fix It July 28, 2021 Information is everything. When a security incident takes place that affects your systems, most security experts agree that they would... Blog Post The Year 2020 Witnessed A Growth Of 150% In Ransomware Attacks Against the Backdrop of Pandemic March 25, 2021 The year 2020 witnessed a growth of 150% in ransomware attacks, with a two-fold surge in ransom amount on average.... Blog Post A Unique Attack – Tycoon ransomware June 25, 2020 A new and undiscovered ransomware is targeting Windows and Linus PCs and it names Tycoon after reference in the code.... Blog Post Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about... Blog Post North Korea is Reusing Malware! What Does This Mean? February 29, 2020 Among the hacking groups from North Korea, there is a group called Lazarus has plundered and pillaged the global internet,... Blog Post 26% of Ransomware Attacks Target Corporate Businesses December 6, 2017 New research from Kaspersky Lab has revealed that the number of ransomware attacks targeting businesses have risen to 26% this... Blog Post Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there... Knowledge Center Osquery for Cyber Incident Response March 19, 2020 In this case study we demonstrate the use of Osquery framework for cyber security incident response.In this case study we...
Blog Post What are the differences between Static, Dynamic and Hybrid Malware Analysis? November 4, 2020 In 2019, 114 million new malware applications were detected. 43 million new threats were already picked up in the first...
Blog Post LIFARS Voltaire – New Open Source Tool for Cyber Incident Response Triage March 10, 2020 LIFARS, the global leader in Incident Response, Digital Forensics, Ransomware Mitigation and Cyber Resiliency Services, has released a new open-source...
Knowledge Center Ransomware Fix and Cyber Vaccines – Malware Analysis of Dridex, BitPaymer and DoppelPaymer campaign November 27, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex (Evil Corp)...
Blog Post What is Malware Analysis/Malware Reverse Engineering? February 26, 2019 Most people know the process of software design, programming or scripting. They use their favorite IDE (Integrated Development Environment) to either...
Blog Post Open Source and Free Tools for Incident Response Teams November 26, 2019 LIFARS Incident and Response team uses multiple tools when responding to and investigating incidents. For new and upcoming enthusiasts and...
Blog Post How to Strengthen Your Security by Adopting a More Proactive Posture July 29, 2021 Most organizations today invest heavily in reactive measures in an effort to shore up their security against a growing landscape...
Blog Post LIFARS expert at the Summer School of Cybercrime September 18, 2020 CSIRT-UPJS – a security team from the University of Pavol Jozef Šafárik in Košice, Slovakia has organized the third Summer School...
Blog Post Why You’re Lacking Adequate Security Event Logs and How to Fix It July 28, 2021 Information is everything. When a security incident takes place that affects your systems, most security experts agree that they would...
Blog Post The Year 2020 Witnessed A Growth Of 150% In Ransomware Attacks Against the Backdrop of Pandemic March 25, 2021 The year 2020 witnessed a growth of 150% in ransomware attacks, with a two-fold surge in ransom amount on average....
Blog Post A Unique Attack – Tycoon ransomware June 25, 2020 A new and undiscovered ransomware is targeting Windows and Linus PCs and it names Tycoon after reference in the code....
Blog Post Introducing The New Logchecker Tool Developed By LIFARS January 12, 2021 Threat intelligence is one of the most critical weapons we can use in cyber defense. We constantly collect data about...
Blog Post North Korea is Reusing Malware! What Does This Mean? February 29, 2020 Among the hacking groups from North Korea, there is a group called Lazarus has plundered and pillaged the global internet,...
Blog Post 26% of Ransomware Attacks Target Corporate Businesses December 6, 2017 New research from Kaspersky Lab has revealed that the number of ransomware attacks targeting businesses have risen to 26% this...
Blog Post Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there...
Knowledge Center Osquery for Cyber Incident Response March 19, 2020 In this case study we demonstrate the use of Osquery framework for cyber security incident response.In this case study we...