EHA
Restricting Access to Resources

How Restricting Access to Resources Improves Cyber Security

Something needs to change with cyber security. One study found that between 2021 and 2022, data breaches increased by over 72%. You can't argue that those aren't alarming figures that surely will only increase. Even...
Passwords Pointless

Has the Shifting Cyber Security Landscape Made Passwords Pointless?

In 2022, over 24 million passwords were exposed. Are passwords becoming pointless? Even if you have one, it seems like every day there's a new cyber attack on a business, leading to compromised details. And...
Cybersecurity Policies

5 Tips for Crafting Effective Cybersecurity Policies for Your Business In 2024

We challenge you to find us a business without an online presence. You'd have to go to a remote town and visit a family-run shop that still has the great Grandma behind the till. What...
EU Governing Bodies Take Cyber Security Seriously

Do EU Governing Bodies Take Cyber Security Seriously?

Wie, seriously, do you think the EU is taking cybersecurity? Let's look at the numbers. As of 1 day ago, there were 2,289,599,662 breached records from 556 publicly disclosed incidents in the EU. The most...
How Difficult is Analyzing Malware Shielded by Themida and VMProtect – SOC/DFIR Guide

How Difficult is Analyzing Malware Shielded by Themida and VMProtect – SOC/DFIR Guide

Researchers analyzed six malware families that are using the protectors Themida and VMProtect. None of the samples used code virtualization, significantly simplifying the analysis, as only one sample had anti-debugging enabled.  The malware code itself...
Tools for Conducting Malware Traffic Analysis in a Sandbox

Tools for Conducting Malware Traffic Analysis in a Sandbox

A malware sandbox is a versatile solution that offers a variety of tools for studying malicious behavior, including threats’ network traffic. A quick sandbox analysis can reveal tons of useful information, such as the...
ANY RUN Sandbox Added New Features to Analyse Sophisticated Malware

ANY RUN Sandbox Added New Features to Analyse Sophisticated Malware

ANY.RUN revamped their user interface for a more streamlined workflow, as the sandbox homepage now features shortcut buttons for launching new analysis sessions, eliminating the need to navigate through the outdated map interface.  A dedicated...
UAC Bypass: 3 Methods Used Malware In Windows 11 in 2024

UAC Bypass: 3 Methods Used Malware In Windows 11 in 2024

User Account Control (UAC) is one of the security measures introduced by Microsoft to prevent malicious software from executing without the user's knowledge. However, modern malware has found effective ways to bypass this barrier...
Sandbox Tools for Phishing Analysis

5 Sandbox Tools for Phishing Analysis in 2024

There is a wide variety of solutions one can use to investigate phishing attacks. Yet, in most cases, analysts can do with just one, a malware analysis sandbox. Thanks to its combination of static...
Quickly Check if a Sample is Malicious with ANY.RUN Sandbox Process Tree

Quickly Check if a Sample is Malicious with ANY.RUN Sandbox Process Tree

ANY.RUN's Process Tree shows all the processes that start when a file or URL is run in its sandbox, along with their hierarchical relationships.This is accomplished by capturing the initial process initiated by the...

Managed WAF

Website

Latest News

  翻译: