@sudosev | AlienVault Blogs
The AlienVault Blogs
Taking On Today’s Threats


Computer & Network Security student, Intern IT Security Analyst and Malware hunter/analyst hobbyist.



As time goes by, criminals are developing more and more complex methods of obscuring how their malware operates, making it increasingly difficult to detect and analyze. The list of tactics used is seemingly endless and can include obfuscation, packers, executing from memory with no file drop, and P2P botnet architecture with frontline command and control servers (C2s) and… Read more

Tags: home malware lab, malware hunting

Get the latest
security news in
your inbox.

Subscribe via Email

Labs Research
Security Essentials
All Blogs

Beginners Guide

Featured Content

Get Price Free Trial Chat