Sudip SenguptaforSudip's Blog on Cloud, DevOps, Cybersecurity and ITSMssengupta3.hashnode.net路Apr 21, 2023Reverse Engineering Malware: Techniques And Tools For Analyzing And Dissecting Malicious SoftwareCybercriminals commonly employ malicious programs to obtain unauthorized system access, exfiltrate sensitive information, or disrupt essential services. In order to defend against these threats, cybersecurity professionals use various approaches to a...Discuss路1 likemalware analysis
Samuel AddisonforThe Anchor Blogssamaddy.hashnode.net路Apr 11, 2023Malicious Document Analysis: Tips and Tools for Static AnalysisMalicious documents are a common vector for malware attacks. They can be disguised as harmless files, such as Microsoft Office documents or PDFs, and can contain hidden scripts or macros that execute when opened. Analyzing malicious documents is an i...Discussstatic malware analysis
Sudip SenguptaforSudip's Blog on Cloud, DevOps, Cybersecurity and ITSMssengupta3.hashnode.net路Apr 21, 2023Reverse Engineering Malware: Techniques And Tools For Analyzing And Dissecting Malicious SoftwareCybercriminals commonly employ malicious programs to obtain unauthorized system access, exfiltrate sensitive information, or disrupt essential services. In order to defend against these threats, cybersecurity professionals use various approaches to a...Discuss路1 likemalware analysis
Samuel AddisonforThe Anchor Blogssamaddy.hashnode.net路Apr 11, 2023Malicious Document Analysis: Tips and Tools for Static AnalysisMalicious documents are a common vector for malware attacks. They can be disguised as harmless files, such as Microsoft Office documents or PDFs, and can contain hidden scripts or macros that execute when opened. Analyzing malicious documents is an i...Discussstatic malware analysis