Archive for the Malware Analysis / Reverse Engineering Category

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

[podcast] Carbon Black’s Ben Johnson: EDR and threat intel

[podcast]  Carbon Black’s Ben Johnson: EDR and threat intel

  Ben Johnson (@chicagoben on Twitter) has spent a good deal of time working on protecting client’s endpoints. From his work at the NSA, to being the co-founder of Carbon Black (@carbonblack_inc). Ben is co-founder and chief security strategist for Carbon Black. In that role, he uses

Read more

[podcast] Earl Carter dissects the Angler Exploit Kit

[podcast] Earl Carter dissects the Angler Exploit Kit

Earl Carter (@kungchiu) spends all day researching exploit kits and using that information to protect customers from various malware payloads that spread ransomware.  This week we sit down with him to understand the #Angler EK. He starts us off with a history or where it came from

Read more

Sunday’s Cyber Security Fact: Unique Pieces of Malware (July 10, 2016)

“Symantec discovered more than 430 million new unique pieces of malware in 2015, up 36 percent from the year before. Perhaps what is most remarkable is that these numbers no longer surprise us. As real life and online become indistinguishable from each other, cybercrime has become a

Read more

[podcast] DFIR conference, DFIR policy controls, and a bit of news

  Mr. Boettcher is back!  We talked about his experiences with the #DFIR conference, and we get into a discussion about the gap between when incident response is and when you’re using #digital #forensics. Mr. Boettcher and I discuss what is needed to happen before #incident #response

Read more

Tradecraft Tuesday – Mobile Exploitation

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each week in a LIVE video chat. These unrehearsed conversations allow

Read more

[#podcast] Aamir Lakhani discusses the DarkWeb…is all the content on the Darkweb bad? And becoming a known quantity on the DarkWeb…

[#podcast] Aamir Lakhani discusses the DarkWeb…is all the content on the Darkweb bad? And becoming a known quantity on the DarkWeb…

  Mr. Boettcher and I met Mr. Aamir #Lakhani at DerbyCon this year, and immediately intrigued with his work on the Dark Web. He has assisted with law enforcement investigations, a known member of the dark web, to the point where people with #malware or bots will

Read more

[podcast] BlackNurse, Buenoware, ICMP, Atombombing, and PDF converter fails

  This week, Mr. Boettcher found himself with an interesting conundrum concerning what happened when he converted a Windows DOCX file to a PDF using a popular #PDF converter software. We discuss what happened, how Software Restriction Policy in Windows kept him safe from a potential malware

Read more

The dark side of programming

The dark side of programming

Even though the average person might not be aware of it, software is everywhere in our daily lives. Everything from online transactions, buying a smartphone, to driving a car involves software. As consumers, we assume and take for granted that the software used to take care of

Read more

[podcast] Amanda Berlin, the art of the sale, and Malware droppers

[podcast] Amanda Berlin, the art of the sale, and Malware droppers

  “Always Be Closing” is the mantra that Alec Baldwin’s character “Blake” intones in the movie “#GlenGarry #Glen #Ross”. Ironically, the film about 4 men selling was a failure in the theaters. A lot of times as #blue #teamers, we find ourselves in the sights of a

Read more
Page 2 of 212

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel