Search Results for: reverse engineering Blog Post What is Malware Analysis/Malware Reverse Engineering? February 26, 2019 Most people know the process of software design, programming or scripting. They use their favorite IDE (Integrated Development Environment) to either... Blog Post What Is Obfuscation In Security And What Types of Obfuscation Are There? November 26, 2020 Obfuscation is a mighty technique widely used by hackers as well as security teams all over the globe. They have... Blog Post Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and... Knowledge Center Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is... Knowledge Center Clipper AutoIt v2 – QUILCLIPPER AutoIt Malware July 1, 2020 Overview. During a recent engagement, the LIFARS DFIR Team discovered a sample of rare malware, which uses not very common techniques. It turns out that... Blog Post Hacking with Artificial Intelligence December 17, 2019 Artificial intelligence (AI) have entered the everyone’s life, and we can see many AI-related products everywhere, such as Siri, AI... Blog Post Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They... Blog Post Top Penetration Testing Certifications May 30, 2020 To be a penetration tester, you should always start with other IT and tech careers, such as general IT, but... Blog Post Open Source and Free Tools for Incident Response Teams November 26, 2019 LIFARS Incident and Response team uses multiple tools when responding to and investigating incidents. For new and upcoming enthusiasts and... Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... Blog Post What is Penetration Testing? January 29, 2020 Penetration testing is a type of security testing that evaluates an organization’s ability to protect its application, network, system, and... Blog Post From Dridex to BitPaymer Ransomware to DoppelPaymer……The Evolution November 21, 2019 Evil Corp, also known as INDRIK SPIDER and TA505, released BitPaymer ransomware in 2017, after hitting some obstacles with Dridex.... Blog Post Malware Analysis of Dridex, BitPaymer and DoppelPaymer Campaigns November 26, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex initially used it... Page Digital Forensics September 23, 2015 Containing a threat is the first step in the Incident Response life-cycle, but gathering information and evidence to pursue legal... Blog Post The Need for Cyber Incident Response April 1, 2020 It is essential that every organization is prepared for the worst. Hence the key to handle such a situation is...
Blog Post What is Malware Analysis/Malware Reverse Engineering? February 26, 2019 Most people know the process of software design, programming or scripting. They use their favorite IDE (Integrated Development Environment) to either...
Blog Post What Is Obfuscation In Security And What Types of Obfuscation Are There? November 26, 2020 Obfuscation is a mighty technique widely used by hackers as well as security teams all over the globe. They have...
Blog Post Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and...
Knowledge Center Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is...
Knowledge Center Clipper AutoIt v2 – QUILCLIPPER AutoIt Malware July 1, 2020 Overview. During a recent engagement, the LIFARS DFIR Team discovered a sample of rare malware, which uses not very common techniques. It turns out that...
Blog Post Hacking with Artificial Intelligence December 17, 2019 Artificial intelligence (AI) have entered the everyone’s life, and we can see many AI-related products everywhere, such as Siri, AI...
Blog Post Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They...
Blog Post Top Penetration Testing Certifications May 30, 2020 To be a penetration tester, you should always start with other IT and tech careers, such as general IT, but...
Blog Post Open Source and Free Tools for Incident Response Teams November 26, 2019 LIFARS Incident and Response team uses multiple tools when responding to and investigating incidents. For new and upcoming enthusiasts and...
Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous...
Blog Post What is Penetration Testing? January 29, 2020 Penetration testing is a type of security testing that evaluates an organization’s ability to protect its application, network, system, and...
Blog Post From Dridex to BitPaymer Ransomware to DoppelPaymer……The Evolution November 21, 2019 Evil Corp, also known as INDRIK SPIDER and TA505, released BitPaymer ransomware in 2017, after hitting some obstacles with Dridex....
Blog Post Malware Analysis of Dridex, BitPaymer and DoppelPaymer Campaigns November 26, 2019 Threat actors are constantly working towards finding new and complex ways to deploy cyber-attacks. The affiliates behind Dridex initially used it...
Page Digital Forensics September 23, 2015 Containing a threat is the first step in the Incident Response life-cycle, but gathering information and evidence to pursue legal...
Blog Post The Need for Cyber Incident Response April 1, 2020 It is essential that every organization is prepared for the worst. Hence the key to handle such a situation is...