article thumbnail

Malicious PDF Analysis

Security Affairs

In the last few days I have done some analysis on malicious documents, especially PDF. Then I thought, “Why not turn a PDF analysis into an article?” Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

Malware Static Analysis

Security Affairs

Malware researcher and founder of Yoroi Marco Ramilli shared a simple tool for malware static analysis he used to perform massive Malware analysis research. By clicking on the desired table raw a modal popup will show you static analysis details such as, which YARA rule has been hit. You can make your analysis here: [link].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malware campaign attempts to evade analysis with Any.Run sandbox

Security Affairs

Malware authors are implementing the capability to check if their malicious code is running in the Any.Run malware analysis service. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->. Pierluigi Paganini.

article thumbnail

Dragos Report: Analysis of ICS flaws disclosed in 2019

Security Affairs

Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->. The post Dragos Report: Analysis of ICS flaws disclosed in 2019 appeared first on Security Affairs. Additional details are included in the report published by Dragos.

Access 110
article thumbnail

“Collection #1” Data Breach Analysis – Part 2

Security Affairs

The cyber security expert Marco Ramilli continues its analysis of the data leak known as Collection #1, he shared some interesting views on data The cyber security expert Marco Ramilli continues its analysis of the data leak known as Collection #1, he shared some interesting views on data. Pierluigi Paganini.

article thumbnail

“Collection #1” Data Breach Analysis – Part 1

Security Affairs

Today I’d like to write a quick partial analysis that I’ve been able to extract from those records (I grabbed data from public available pasties website). PARTIAL Analysis of Collection #1. Collection #1 PARTIAL Analysis on used passwords. PARTIAL Analysis on most leaked domain. PARTIAL Analysis Collection#1 Structure.

article thumbnail

SEC Xtractor – Experts released an open-source hardware analysis tool

Security Affairs

Security and consulting company SEC Consult announced the release of an open-source hardware analysis tool dubbed SEC Xtractor. Security firm SEC Consult announced the release of an open-source hardware analysis tool dubbed SEC Xtractor. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.