Newest Articles

MALWARE-HUNTING

An introduction to malware beaconing

Malware beaconing is a technique used by cybercriminals to establish a connection with a command-and-control (C2) server and maintain ongoing communication.

Mar 3rd, 2023 by Ryan Victory

MALWARE-HUNTING

Finding malware beacons with Fast Fourier Transform (FFT)

Malware beacons often occur at precise periodic intervals. This behavior makes them easier to detect, especially using digital signal processing techniques such as Fast Fourier Transform (FFT)

Mar 3rd, 2023 by Ryan Victory

MALWARE-EDUCATION

Malware analysis: Static vs. Dynamic methods

If you've read about malware analysis techniques, you may have heard references to "static" and "dynamic" analysis techniques. What do these terms mean? Why would you choose one over the other?

Mar 3rd, 2023 by Ryan Victory

ANNOUNCEMENTS

Introducing malware[.]net

malware[.]net: your single source for Malware News, Cybersecurity Threat Hunting Resources, Tools, Threat Intel, and more. All malware, all the time!

Mar 1st, 2023 by Ryan Victory