↧
Looking back on BlackHoodie, a women’s-only reverse engineering conference
Malware reverse-engineer Luca Nagy reflects on her experiences attending a unique technical conference
View ArticleEmotet 101, stage 3: The Emotet executable
Emotet’s arrival is usually preceded by a deceptive spam email, which has a malicious attachment. Opening the attachment starts a process which can lead to an Emotet infection. The Emotet application...
View ArticleGandCrab 101: All about the most widely distributed ransomware of the moment
In this Sophos101 report, we'll give you the lowdown on what you need to know about this, unfortunately, widely disseminated malware.
View ArticleNearly a quarter of malware now communicates using TLS
Encryption is one of the strongest weapons malware authors can leverage: They can use it to obfuscate their code, to prevent users (in the case of ransomware) from being able to access their files, and...
View Article
More Pages to Explore .....