New: malware-analysisAll contenthive-129948hive-196917krsteemhive-150122hive-180932zzanhive-183959photographyhive-166405hive-185836hive-144064hive-188619hive-183397hive-101145uncommonlabhive-145157hive-103599hive-184714hive-150943hive-193637hive-180106hive-109690bitcoinhive-138689TrendingNewHotLikerscristi (70)in science • 7 years agoMalware Analysis - Intro to RE - Lecture 2 [CS7038]This is the second lecture of the malware analysis course taught by Professor Coleman Kane. It's a one hour lecture comprising of the following topics: inspecting raw pdfs creating a python…cristi (70)in cybersecurity • 7 years agoHow Does Avast Perform with Ransomware - [TPSC Test]I talked in a previous post about my interest in active defense against malware. For that matter, I've been watching numerous reviews of different AV software and how they perform when the system is…cristi (70)in cybersecurity • 7 years agoHow to Set Up a Malware Analysis Lab - [OALabs]I know I was very confused the first time I created a virtual machine for malware analysis. My biggest concern was how to make sure that the samples I'm analyzing are not to escape the isolation…