April 13, 2024, 9:23 p.m. | /u/H1t0p

cybersecurity www.reddit.com

I was studying malware analysis on some malware samples and it got me thinking of how researchers get these samples, because some malwares delete the first file that started the infection and most malwares try to obfuscate the infection... So, how do researchers get samples after the machine got infected?

analysis cybersecurity delete file incident incident response infection machine malware malware analysis malwares researchers response thinking try

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Associate Manager, BPT Infrastructure & Ops (Security Engineer)

@ SC Johnson | PHL - Makati

Cybersecurity Analyst - Project Bound

@ NextEra Energy | Jupiter, FL, US, 33478

Lead Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts

Junior Information Security Coordinator (Internship)

@ Garrison Technology | London, Waterloo, England, United Kingdom

Sr. Security Engineer

@ ScienceLogic | Reston, VA