malware Archive
+
Have you ever wondered how malware is detected? How do malware scanners work? How does Gmail know that the suspicious attachment you got was “dangerous”? The …
By Andreas Griffin
March 12, 2020
+
In recent times, I have learned about techniques in developing modern malware. One of those techniques was to utilize PowerShell without executing the powershell.exe binary. After …
By Andreas Griffin
March 5, 2020
+
1. What is Living off the Land? The use of Living off the Land (LotL) tactics and tools by cyber criminals has been a growing trend …
By Andreas Griffin
February 27, 2020
+
Fast-Flux is a DNS technique that involves frequent and rapid changing of the IP addresses associated with a Fully Qualified Domain Name (FQDN) by using a …
By Andreas Griffin
February 12, 2020
+
Usually, malicious code connects to the C&C server via a domain or IP address. DGA – Domain Generation Algorithm is a technique employed by the malware …
By Andreas Griffin
September 12, 2019
+
Description Linux Malware Detect, also known as maldet or LMD, is one popular option that can be easily installed and configured to scan for known malware …
By Win Stark
August 11, 2017