Remove malware-analysis-webcast
article thumbnail

REMnux 7, a Linux toolkit for malware analysts released

Security Affairs

A new version of the REMnux Linux toolkit for malware analysts is available for download, it includes a huge set of tools for professionals. REMnux is a Linux toolkit for reverse-engineering and dissecting software, it includes a collection of free tools created by the community that allows researchers to investigate malware.

Malware 124
article thumbnail

Version 7 of the REMnux Distro Is Now Available

Lenny Zeltser

This Linux distribution for malware analysis includes hundreds of new and classic tools for examining executables, documents, scripts, and other forms of malicious code. I’ve scheduled a What’s New in REMnux v7 webcast to showcase the new distro for July 28, 2020. host Run REMnux distro as a Docker container.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Get and Set Up a Free Windows VM for Malware Analysis

Lenny Zeltser

You’ll want snapshots when examining malware, so you can revert the VM’s state to start a new investigation or backtrack an analysis step. Step 3: Update the VM and Install Malware Analysis Tools. You can use this connection to update the OS to the latest patch level and install malware analysis tools.

Malware 112
article thumbnail

Ransomware 'Direct Threat' to Economy: Key Findings by U.S. Treasury

SecureWorld News

Treasury Department released its Financial Trend Analysis report on Friday, providing the lay of the land when it comes to ransomware in the first two quarters of 2021. Ransomware analysis by Financial Crimes Enforcement Network. billion in outgoing BTC transactions potentially tied to ransomware payments," reads the analysis.

article thumbnail

Was the NRA Hit by Ransomware?

SecureWorld News

From an analysis of the files, it appears the ransomware group stole documents related to the NRA grants, including downloading blank grant forms and accessing grant recipient contact information. The Grief ransomware gang claims it has hit the National Rifle Association (NRA). pic.twitter.com/TTqfnuDons — Graham Cluley (@gcluley).

article thumbnail

Webinar on cyberattacks in Ukraine – summary and Q&A

SecureList

On March 10, 2022 Kaspersky’s Global Research and Analysis Team (GReAT) shared their insights into the current (and past) cyberattacks in Ukraine. We advise organizations to: Take typical measures against DDoS attacks, ransomware and destructive malware, phishing, targeted attacks, supply-chain attacks and firmware attacks.

DDOS 84
article thumbnail

CIS 20 Controls: Utilizing CIS 20 Critical Controls for Vulnerability Prioritization

NopSec

Note: This is a gist of an informative webcast by our CTO. To catch the free webcast in its entirety on-demand, catch it here at CIS 20 Controls: How Unified VRM Can Help. Dynamic Analysis OWASP Top 10 vulnerabilities, including SQLi, XSS, CSRF, path traversal, etc.