NI logo
  • Home
  • NII Home
  • About Us
  • Services
  • Products
    • FireSec
    • BlueScope
  • Research
  • Get Blog Updates

dynamic analysis

No Image

Analysis of Malware: Detecting Behavior & Anti-Reversing Techniques

April 17, 2014 Sanoop Thomas 2

Scenario: One of our clients observed a suspicious behavior in a program and wanted us to analyze and identify if any malicious activities were being performed by the same. The [more]

Follow Us

  • Twitter
  • LinkedIn
  • Instagram
  • Facebook

Search

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 126 other subscribers

Top Posts

  • Malware Development – Welcome to the Dark Side: Part 1
    Malware Development – Welcome to the Dark Side: Part 1
  • A Detailed Guide on OSCP Preparation - From Newbie to OSCP
    A Detailed Guide on OSCP Preparation - From Newbie to OSCP
  • IT Act 2000 – Penalties, Offences With Case Studies
    IT Act 2000 – Penalties, Offences With Case Studies
  • From SQL Injection To 0wnage Using SQLMap
    From SQL Injection To 0wnage Using SQLMap
  • Threat actor groups are targeting VMware Horizon servers running versions affected by Log4Shell vulnerabilities
    Threat actor groups are targeting VMware Horizon servers running versions affected by Log4Shell vulnerabilities
  • Significance of a career in Security Operations Center  (SOC)
    Significance of a career in Security Operations Center (SOC)
  • Malware Development – Welcome to the Dark Side: Part 2-1
    Malware Development – Welcome to the Dark Side: Part 2-1
  • Consumer Protection Regulation
    Consumer Protection Regulation
  • Manipulating Host Headers - Not Anymore !
    Manipulating Host Headers - Not Anymore !
  • Threat actors are targeting critical organizations using destructive malware – “WhisperGate”
    Threat actors are targeting critical organizations using destructive malware – “WhisperGate”
  • National Information Assurance (NIA) Policy V2.0 –Qatar
  • 5 Cybersecurity lessons to learn from Stranger Things 
  • Consumer Protection Regulation
  • The Supply Chain Cybersecurity Saga: Challenges and Solutions
  • Attackers are actively exploiting a critical zero-day vulnerability in Adobe Commerce and Magento Open Source products
  • Breaking up on Valentine’s Day!
  • Threat actor groups are targeting VMware Horizon servers running versions affected by Log4Shell vulnerabilities
  • Threat actors are targeting critical organizations using destructive malware – “WhisperGate”
  • Holiday wishes from the CEO’s Desk!
  • Kickstart your holiday spirit with some cybersecurity binge watching!
Assessment C++ coding cybersecurity Cyber Security Elasticsearch ELK forensics FUD fully undetectable hacking holidays Kibana malware Malware Analysis malware development PCI DSS Penetration Testing pentesting Ransomware red team security trojan virus Vulnerability Assessments
  • Pankaj Lad: It would have been better if there were a small liner kind of definations used for these termologies.
  • gmd: Can you please update the blog? as the images are not accessible. Thankyou.
  • Anuraag B: You can check our online courses here.

Copyright © 2022 | WordPress Theme by MH Themes