Malware beaconing is a technique used by cybercriminals to establish a connection with a command-and-control (C2) server and maintain ongoing communication.
Malware beaconing is a technique used by cybercriminals to establish a connection with a command-and-control (C2) server and maintain ongoing communication.
Mar 3rd, 2023
MALWARE-EDUCATION
Malware analysis: Static vs. Dynamic methods
If you've read about malware analysis techniques, you may have heard references to "static" and "dynamic" analysis techniques. What do these terms mean? Why would you choose one over the other?
Mar 3rd, 2023
Newest Articles
MALWARE-HUNTING
An introduction to malware beaconing
Malware beaconing is a technique used by cybercriminals to establish a connection with a command-and-control (C2) server and maintain ongoing communication.
Mar 3rd, 2023 by Ryan Victory
MALWARE-HUNTING
Finding malware beacons with Fast Fourier Transform (FFT)
Malware beacons often occur at precise periodic intervals. This behavior makes them easier to detect, especially using digital signal processing techniques such as Fast Fourier Transform (FFT)
Mar 3rd, 2023 by Ryan Victory
MALWARE-EDUCATION
Malware analysis: Static vs. Dynamic methods
If you've read about malware analysis techniques, you may have heard references to "static" and "dynamic" analysis techniques. What do these terms mean? Why would you choose one over the other?
Mar 3rd, 2023 by Ryan Victory
ANNOUNCEMENTS
Introducing malware[.]net
malware[.]net: your single source for Malware News, Cybersecurity Threat Hunting Resources, Tools, Threat Intel, and more. All malware, all the time!