TOPICS / Malware Analysis
Malware Analysis
Triage, identify, and reverse-engineer malicious files.
Malware analysis turns an unknown sample into actionable intelligence — its family, capabilities, indicators, and how to detect it. The fastest first step is hash reputation; deeper analysis uses signatures and sandboxing.
These tools and references support every stage, from quick triage to writing detection rules.
Free tools
Practice
Latest coverage
- CISA Contractor Leaked AWS GovCloud Keys on GitHub for Six Months
- Ghostwriter Deploys Prometheus Phishing Lures Against Ukraine Government Entities
- Screening Serpens: Iranian APT Fuses AppDomainManager Hijacking with New RATs in 2026 Espionage Campaign
- CVE-2026-20182: Cisco Catalyst SD-WAN CVSS 10.0 Auth Bypass Actively Exploited
- Kali365 PhaaS Kit Bypasses Microsoft 365 MFA via Device Code Phishing — FBI Warning
- Megalodon: Supply Chain Attack Backdoors 5,561 GitHub Repos in Six Hours via CI/CD Workflow Injection
- Stolen Gemini API Keys and AI Fraud: How 'Quantum Patriot' Drained Crypto Wallets via Fake QAnon Content
- Stack String Obfuscation in C: The Technique That Blinds AV, YARA, and Static Scanners
Key terms
Reference databases