Category: Webinar

Manual interaction allows incident response teams to scrutinize suspect files, URLs, and snippets of code that have either raised a cautionary flag or completely evaded detection by automated methods. In manual mode, analysts can directly interact with suspicious samples.
In this analysis, the VMRay Labs Team examines the behavior of Rhino Ransomware (first identified in April 2020). This sample was found by Twitter user @GrujaRS on May 4th.
In this Malware Analysis Spotlight, the VMRay Labs Team will examine Paymen45 Ransomware, a new ransomware strain first identified around April 2020. For this analysis, we will analyze a sample of Paymen45 Ransomware first seen in the wild on May 11th, 2020.
Watch SANS Analyst, Jake Williams and Sr. Threat Analyst Tamas Boczan dissect living off the land techniques.
Learn practical malware family identification techniques from SANS Analyst, Jake Williams and Sr. Threat Analyst Tamas Boczan.
In this GreHack 2018 presentation, you will learn the technical details about the different methods used to distribute GandCrab, interesting facts about the packer, and evolution of the payload.

   In this SANS Webcast, VMRay Solution Engineer Ben Abbott, Sr. Threat Researcher Tamas Boczan and SANS analyst Brandon McCrillis explore context-aware malware techniques. By watching this webcast you will learn: Primary methods threat actors have adopted to better understand the context of the analysis environment How context-aware malware

In this video, we will show you the various checks that Pafish uses to test the analysis environment.
Watch VMRay Technical Lead, Felix Seele's OBTS v2 Talk on hypervisor-based analysis of macOS malware
Watch our video analysis of Trickbot, found on May 16th, 2019.

Uncover the truth of Cybersecurity, one story at a time

Keep up to date with our weekly digest of articles. Get the latest news, invites to events, and threat alerts!

Subscribe to our Newsletter