article thumbnail

Security Analysis of Threema

Schneier on Security

A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users and 7000 corporate customers.

Security 118
article thumbnail

Malicious file analysis – Example 01

Security Affairs

Cyber Security Specialist Zoziel Pinto Freire shows an example of malicious file analysis presented during his lecture on BSides-Vitória 2022. My objective with this series of articles is to show examples of malicious file analysis that I presented during my lecture on BSides-Vitória 2022. Static Analysis x Dynamic Analysis.

Libraries 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

REMnux Tools List for Malware Analysis

Lenny Zeltser

In addition to providing numerous tools as part of the REMnux distro, the project also offers several malware analysis tools as Docker images. To learn about the analysis workflow within which you can use these tools, take a look at my article Mastering 4 Stages of Malware Analysis.

article thumbnail

How You Can Start Learning Malware Analysis

Lenny Zeltser

Malware analysis sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering. Understand Where You Currently Fit Into the Malware Analysis Process. I like grouping them in 4 categories, which I detailed in the post Mastering 4 Stages of Malware Analysis.

Metadata 145
article thumbnail

Malicious PDF Analysis

Security Affairs

In the last few days I have done some analysis on malicious documents, especially PDF. Then I thought, “Why not turn a PDF analysis into an article?” SecurityAffairs – PDF analysis, hacking). The post Malicious PDF Analysis appeared first on Security Affairs. About the author : Zoziel Freire.

article thumbnail

Defensible Disposition Program: Article One—Let’s get down to Basics

ARMA International

It is easy to get stuck in “analysis paralysis” when attempting to start and maintain a disposition program. You will likely find buckets of information that can be addressed quickly and most certainly those that require in-depth analysis, either by people, software, or a combination of both.

article thumbnail

Know Your Program – SWOT Analysis

The Texas Record

One way to ensure that these vital programs thrive is to conduct a SWOT analysis. A SWOT analysis is a strategic management tool that can be used solo or prior to conducting a TOWS metric (which we will discuss briefly in this article). A SWOT analysis analyzes the strengths, weaknesses, opportunities, and threats of a program.