Remove Blog Remove Computer and Electronics Remove Government Remove How To
article thumbnail

Malware Training Sets: FollowUP

Security Affairs

So, I came up with this blog post and this GitHub repository where I proposed a new testing-set based on a modified version of Malware Instruction Set for Behavior-Based Analysis , also referred as MIST. The original post along many other interesting analysis are available on the Marco Ramilli blog: [link].

article thumbnail

Scraping the TOR for rare contents

Security Affairs

Cyber security expert Marco Ramilli explains the difficulties for scraping the ‘TOR networks’ and how to enumerate hidden-services with s crapers. I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Step By Step Office Dropper Dissection

Security Affairs

Malware researcher and founder of Yoroi Marco Ramill described a step-by-step procedure that shows how to dissect an Office dropper. During the past few weeks, I received several emails asking how to dissect Office Payloads. If you are interested on follow a full detailed analysis path, please take a look to Yoroi’s Blog.

article thumbnail

How should you investigate a data breach?

IT Governance

So how should you approach a data breach investigation? This might be, for example,the victim’s computer, a web page or a physical space in which documents were compromised. Digital forensic investigation requires a combination of technological tools and an expert understanding of how to use them. The crime scene.

article thumbnail

Using Microsoft Powerpoint as Malware Dropper

Security Affairs

Marco Ramilli, founder and CEO at cyber security firm Yoroi has explained how to use Microsoft Powerpoint as Malware Dropper. Indicators of Compromise (IoCs) for the malicious code are reported in the original analysis published by Marco Ramilli in his blog. I am a computer security scientist with an intensive hacking background.

article thumbnail

What is data loss and how does it work?

IT Governance

In this blog, we explain what you need to know and provide data loss prevention tips. This problem is exacerbated when organisations don’t implement policies and procedures on how to handle information. Computer viruses. The post What is data loss and how does it work? appeared first on IT Governance UK Blog.

IT 98
article thumbnail

MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

The Last Watchdog

Here’s a primer about how cyber hygiene best practices – and supporting security tools and services – could gain significant steam in the months ahead, thanks to COVID-19. There is, in fact, deep consensus about how to protect sensitive data and ensure the overall security of corporate networks.