Computer & Network Security student, Intern IT Security Analyst and Malware hunter/analyst hobbyist.

March 1, 2019 | @sudosev

Building a Malware Analysis Lab: Become a Malware Analysis Hunter in 2019

As time goes by, criminals are developing more and more complex methods of obscuring how their malware operates, making it increasingly difficult to detect and analyze. The list of tactics used is seemingly endless and can include obfuscation, packers, executing from memory with no file drop, and P2P botnet architecture with frontline command and control servers (C2s) and…

Watch a Demo ›
Get Price Free Trial