malware analysis
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/11083747/malware-1500-400x200.webp)
The most prevalent malware behaviors and techniques
An analysis of 100,000+ Windows malware samples has revealed the most prevalent techniques used by malware developers to successfully evade defenses, escalate privileges, …
![Microsoft Security Copilot](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/29150233/microsoft-security-copilot-1600-400x200.jpg)
Microsoft announces wider availability of AI-powered Security Copilot
Microsoft Security Copilot has been made available to a larger number of enterprise customers, via an invitation-only Early Access Program. What is Microsoft Security Copilot? …
![rorschach ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/06153556/rorschach-ransomware-400x200.jpg)
Rorschach ransomware deployed by misusing a security tool
An unbranded ransomware strain that recently hit a US-based company is being deployed by attackers who are misusing a tool included in a commercial security product, Check …
![swiss army knife](https://img.helpnetsecurity.com/wp-content/uploads/2023/02/06161543/swiss_army_knife-400x200.jpg)
Malware that can do anything and everything is on the rise
“Swiss Army knife” malware – multi-purpose malware that can perform malicious actions across the cyber-kill chain and evade detection by security controls – is on …
![ChatGPT](https://img.helpnetsecurity.com/wp-content/uploads/2023/01/10200946/chatgpt-400x200.jpg)
ChatGPT: The infosec assistant that is jack of all trades, master of none
ChatGPT from OpenAI is a conversational chatbot that was recently released in preview mode for research purposes. It takes natural language as an input and aims to solve …
![malware analysis tools](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/19153941/malware-analysis-tools-hns-400x200.jpg)
7 open-source malware analysis tools you should try out
There are two main types of malware analysis: static and dynamic. Performing static analysis of a malicious binary means concentrating on analyizing its code without executing …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/10122853/linux-red-danger-400x200.jpg)
Researchers unearth highly evasive “parasitic” Linux malware
Security researchers at Intezer and BlackBerry have documented Symbiote, a wholly unique, multi-purpose piece of Linux malware that is nearly impossible to detect. “What …
![finance biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104705/finance-biohazard-400x200.jpg)
What is challenging malware analysis?
OPSWAT announced a report which reveals that nearly every organization struggles with malware analysis. Specifically, 94% of organizations are challenged to find, train, and …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/19133655/malware-skull-red-400x200.jpg)
Detect and identify IoT malware by analyzing electromagnetic signals
Electromagnetic (EM) emanations can be recorded and used to detect and identify malware running on IoT devices, a group of researchers working at IRISA have proven. The setup …
![SolarWinds](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/16140845/solarwinds-400x200.jpg)
SolarWinds hack investigation reveals new Sunspot malware
Crowdstrike researchers have documented Sunspot, a piece of malware used by the SolarWinds attackers to insert the Sunburst malware into the company’s Orion software. …
![ANY.RUN](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/17111953/any-run-400x200.jpg)
How to speed up malware analysis
Today malware evolves very fast. Loaders, stealers, and different types of ransomware change so quickly, so it’s become a real challenge to keep up with them. Along with that …
![PEtree](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/04121348/blackberry-petree-400x200.jpg)
PE Tree: Free open source tool for reverse-engineering PE files
PE Tree, a malware reverse-engineering, open source tool developed by the BlackBerry Research and Intelligence team, has been made available for free to the cybersecurity …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD