Latest articles
How to Use Volatility for Memory Forensics and Analysis
Apr 12, 2022
This article will cover what Volatility is, how to install Volatility, and most importantly how to use Volatility.
How to Use Ghidra to Reverse Engineer Malware
Mar 21, 2022
An overview of the malware analysis tool Ghidra. This article covers how to install and navigate the Ghidra interface.
Common Types of Malware
Feb 25, 2022
This piece covers the various types of malware that are available and their characteristics.
PeStudio Overview: Setup, Tutorial and Tips
Oct 06, 2021
An overview of the free malware analysis tool PeStudio.
Memory Forensics for Incident Response
Jul 26, 2021
When responding to a cybersecurity incident I’ve always found memory forensics to be a great skill to have. By capturing the memory of a compromised device you can quickly perform…
Process Hacker: Advanced Task Manager Overview
Jun 02, 2021
This article is an overview of the tool Process Hacker. This is a popular tool amongst security professionals when analyzing malware as it will display real-time activity of processes and provide a wealth of technical information on how a particular process is behaving.
Cuckoo Sandbox Overview
May 26, 2021
A Cuckoo Sandbox is an open-source tool that can be used to automatically analyze malware. Imagine, it’s 2 am in the Security Operations Center (SOC) and an alert has triggered…
How to Analyze Malware with x64dbg
May 21, 2021
This is the fourth and final article in a series of blog posts that serve as an x64dbg tutorial. In this article, we will be taking all the knowledge we…
YARA Rules Guide: Learning this Malware Research Tool
May 17, 2021
YARA rules are used to classify and identify malware samples by creating descriptions of malware families based on textual or binary patterns.
Stack Memory: An Overview (Part 3)
Mar 23, 2021
An overview of stack memory, it’s architecture, and how it can be used to reverse-engineer malware using x64dbg.
How to Use Autoruns to Detect and Remove Malware on Windows
Mar 22, 2021
This article acts as a tutorial on how to use Sysinternals Autoruns to detect potentially unwanted software that is installed and running automatically on your device.
How to Unpack Malware with x64dbg
Mar 17, 2021
This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.
Try Varonis free.
Deploys in minutes.