Remove Computers and Electronics Remove Cybersecurity Remove Malware Remove Penetration Testing
article thumbnail

Security expert Marco Ramilli released for free the Malware Hunter tool

Security Affairs

Malware researcher Marco Ramilli released for free the Malware Hunter tool a simple but interesting catching tool base on static YARA rules. Malware researcher Marco Ramilli released for free the Malware Hunter tool a simple but interesting catching tool base on static YARA rules. Malware Static Analysis.

Malware 91
article thumbnail

Malware Training Sets: FollowUP

Security Affairs

The popular expert Marco Ramilli provided a follow up to its Malware classification activity by adding a scripting section which would be useful for several purposes. On 2016 I was working hard to find a way to classify Malware families through artificial intelligence (machine learning).

Malware 70
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Free Tool: Honey Feed

Security Affairs

Cybersecurity expert Marco Ramilli shared another tool of his arsenal that extracts suspicious IPs from undesired connections, his HoneyPots. Hope you might appreciate my intent to share with cybersecurity community free data in order to improve our digital space. In other words: HoneyPots. HoneyPot Page.

article thumbnail

MartyMcFly Malware: new Cyber-Espionage Campaign targeting Italian Naval Industry

Security Affairs

Yoroi security firm uncovered a targeted attack against one of the most important companies in the Italian Naval Industry leveraging MartyMcFly Malware. Further details on the MartyMcFly malware are reported in the original analysis published by Marco Ramilli on his blog. Security Affairs – MartyMcFly , malware).

Malware 89
article thumbnail

Scraping the TOR for rare contents

Security Affairs

First of all you need an exceptional computational power (RAM mostly) for letting multiple runners grab web-pages, extracting new links and re-run the scraping-code against the just extracted links. I am a computer security scientist with an intensive hacking background. Scraping the “TOR hidden world” is a quite complex topic.

article thumbnail

Writing Your First Bootloader for Better Analyses

Security Affairs

Marco Ramilli explained MBR works and how is it possible to write a bootloader program, this skill will help you to analyze next BootLoader Malware. From time to time we might observe special Malware storing themselves into a MBR and run during the booting process. SecurityAffairs – malware, bootloader ). Pierluigi Paganini.

article thumbnail

Frequent VBA Macros used in Office Malware

Security Affairs

The malware expert Marco Ramilli collected a small set of VBA Macros widely re-used to “weaponize” Maldoc (Malware Document) in cyber attacks. Nowadays one of the most frequent cybersecurity threat comes from Malicious (office) document shipped over eMail or Instant Messaging. About the author: Marco Ramilli, Founder of Yoroi.

Malware 72