Security Alerts & News
by Tymoteusz A. Góral

#655 Building a home lab to become a malware hunter - a beginner’s guide
As time goes by, criminals are developing more and more complex methods of obscuring how their malware operates, making it increasingly difficult to detect and analyze. The list of tactics used is seemingly endless and can include obfuscation, packers, executing from memory with no file drop, and P2P botnet architecture with frontline command and control servers (C2s) and gateways being compromised websites. Add to these tactics the concerns about Domain Generations Algorithms (DGA), Fast Flux and Dynamic DNS, and you complicate the mix even further.

Tracking all of these elements might be difficult, but in all honesty, you don't need 10 years of experience in malware analysis and a bunch of certificates to help you win this battle. You just need to experiment. One great way to learn about malware is to build your own home lab and play with actual malware samples within this environment. This can be a fun and educational project even if you are not an InfoSec pro. If you do happen to be an InfoSec pro, the things you learn in your home lab just might help you do your job more effectively. So how do you set one up? A few simple guidelines will get you started.
Read more
#657 Gmail for Android gets Microsoft Exchange support
#656 New decryptor unlocks CryptXXX ransomware
#655 Building a home lab to become a malware hunter - a beginner’s guide
#654 New FAREIT strain abuses PowerShell
#653 Protecting against unintentional regressions to cleartext traffic in your Android apps
#652 Android ransomware attacks using Towelroot, Hacking Team exploits
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12