March 7, 2024, 2:22 p.m. | /u/chundefined

Malware Analysis & Reports www.reddit.com

I've recently started a series based on personal research that focuses on the development and operation of ransomware. And yes, many will say, another post in the pile. Well, you should take a look before judging. I explain all the important points that one needs to know to understand this software, as well as demonstrating with examples the real techniques that are commonly used in most ransomware attacks. I'll be discussing and explaining in depth how this interesting software, which …

development encryption guide important malware personal points ransomware research series techniques understand yes

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States