Please enable JavaScript in your browser to experience / fully
Home
About Malware Research Institute
Archive
Categories
Tags
Categories
news
video
cfp
pdf
code
article
paper
statistics
news
Cuckoo Sandbox 1.2 released
Updated logo
Call for papers/presentations
Conference videos added
Introducing Malware Research Institute
video
Complex Incident Response Investigations: How to Minimise Breach Impact
Reverse Engineering Mac Malware
APTs: Getting Serious About Zero-Day Threats
Extracting Actionable Cyber Intelligence from a RAT Named Poison Ivy
Illbuster - fighting illegal content
Deploying ICS Honeypots to Deceive and Thwart Adversaries
A Threat-Based Security Monitoring Case Study
Cuckoo Sandbox and its recent developments
YARA: The pattern matching swiss knife for malware researchers and everyone else
Visual Malware Reversing: How to Stop Reading Assembly and Love the Code
You can panic now. Host Protection is (mostly) dead
10 Ways to Rock Your SOC
Reconciling Objective Data with Analytical Uncertainty
DFIR Summit 2014 Keynote: Barbarians at Every Gate: Responding to a Determined Adversary
Introduction to Windows Memory Analysis
Brian Baskin - Introducing Intelligence into Malware Analysis
Malware Hunting with Mark Russinovich and the Sysinternals Tools
Malware Hunting with the Sysinternals Tools
Reverse Engineering By Crayon
Cuckoo Sandbox - malware beware [SIGINT13]
Cuckoo Sandbox - Automated Malware Analysis
Memory Forensics for Incident Response - SANS DFIR WEBCAST
Analysis and Correlation of Macintosh Logs - SANS DFIR WEBCASTS
How memory forensics will help you lose weight and look ten years younger - SANS DFIR WEBCAST
Knock off Phone Forensics Some handsets Arent What They Appear To Be - SANS DFIR WEBCAST
Network Forensics What Are Your Investigations Missing - SANS DFIR WEBCAST
Protecting Privileged Domain Accounts during Live Response - SANS DFIR WEBCAST
Detecting Persistence Mechanisms - SANS DFIR WEBCAST
Leveraging Cyber Threat Intelligence
50 Shades of Hidden - Diving deep into code injection - SANS DFIR WEBCAST
Detecting Evil on Windows Systems - An In Depth Look at the DFIR Poster
Theres Gold in them thar package management database
Sick Anti Forensics Mechanisms in the Wild
Panic! Hysteria! No malware required!
DFIR using SIFT Workstation: SANS DFIR Webcast
Virtualization Incident Response
Whats New in REMnux v4 for Malware Analysis? - SANS DFIR Webcast
Super Timeline Analysis - SANS DFIR WebCast
Finding Unknown Malware
Open Source Threat Intelligence - Developing a Threat intelligence program using open source tools and public sources
No Budget Threat Intelligence - Tracking Malware Campaigns on the Cheap
Mirage - Next Gen Honeyports
Malware Development as the Evolution of Parasites
APT Attacks Exposed: Network, Host, Memory, and Malware Analysis
So Easy A High-Schooler Could Do It: Static malware analysis using function-level signatures
ClusterF*ck - Actionable Intelligence from Machine Learning
PlagueScanner - An Open Source Multiple AV Scanner Framework
Blackhat 2012 EUROPE - Entrapment: Tricking Malware with Transparent, Scalable Malware Analysis
Blackhat 2010: Malware Attribution - Tracking Cyber Spies
Chronicles of a Malware Hunter
Advanced Threats & Malware Attacks Rising - Ready for the impact of a breach?
The untold story about ATM Malware
Forget Zero Day, Hello Zero Second!
Memory Forensics with Hyper V Virtual Machines
DEFCON 17 - Making Fun of Your Malware
IR Event Log Analysis
Another Log to Analyze - Utilizing DNS to Identify Malware
Malware Analysis - Let the Computer Do the Work!
Anatomy of memory scraping, credit card stealing POS malware
Malware Analysis 101 - N00b to Ninja in 60 Minutes
cfp
Call For Papers - Security BSides San Francisco April 2015
pdf
Hacker Highschool Lesson 6 - Hacking Malware
code
All NXDOMAIN belongs to InetSim
article
Malware Immunization via Infection Markers
How Malware Generates Mutex Names to Evade Detection
5 Ways To Monitor DNS Traffic For Security Threats
paper
VB2014 paper: Duping the machine - malware strategies, post sandbox detection
VB2014 paper: We know it before you do: predicting malicious domains
statistics
Where is all the malware being hosted, interactive version