Video series: Cybersecurity essentials for IT pros, researchers and malware enthusias
#1
Lightbulb 
Quote:
[Image: logo.svg]

We’ve partnered with popular YouTube tech expert, Leo of The PC Security Channel, to create a brand new video series that offers deep insight into the world of cybersecurity.

In the series, Leo, who also works here at Emsisoft as a Malware Analyst, examines how to decrypt ransomware, the most effective malware analysis tools, best practices for hardening Windows 10 and the threat hunting techniques he uses on a daily basis as a cybersecurity professional.

Watch the videos below or click here to see the full playlist.

Video #1: How to Decrypt Ransomware

Using the Jigsaw ransomware family as an example, this video discusses the concept of data encryption and possible decryption techniques. The video explores a variety of decryption methods, including free decryption tools, analyzing memory dumps and using assisted brute force to crack poorly implemented ransomware.
 

Video #2: Best Malware Analysis Tools

In the second video in the series, Leo highlights the best free software for analyzing malware. From beginner-friendly tools to sophisticated applications designed for advanced researchers, the video covers a wide range of programs that can be used to analyze new .exe files and find malicious processes. The video discusses dynamic analysis tools such as Process ExplorerAutorunsProcess MonitorRegshot and OllyDbg, as well as static analysis tools such as PeStudiodnSpy and Ghidra.
 

Video #3: Advanced VirusTotal Tutorial

VirusTotal is a popular free online service that analyzes suspicious files and URLs, and automatically shares malware samples with the wider cybersecurity community. This video discusses how to use VirusTotal’s advanced functions to get greater insight into a suspected threat.
 

Video #4: Windows 10 Hardening

This video focuses on how users can configure Windows 10 to reduce a system’s attack surface. The video discusses a range of easy-to-implement techniques, including utilizing the principle of least privilege, configuring system updates, disabling unnecessary features and changing various settings in Windows Security to improve the resilience of the operating system.


Video #5: Threat Hunting Tutorial

This video provides a comprehensive overview of the different types of threat hunting, including hunting existing threats within an organization, proactively hunting threats on the Internet using tools like YARA rules and using traps in a sandbox environment to detect threats.


Where to go from here?

If you’re looking for more malware analysis tutorials, we recommend our Manual Malware Removal series. The series features manual malware removal tips and techniques from Emsisoft’s resident security experts.
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AMD suggests it may open-source FSR 4 a...
AMD still has nothin...harlan4096 — 17:21
Intel Arc G3 Panther Lake series for han...
Intel G3 with LPDD...harlan4096 — 07:32
Core Ultra 7 270K Plus and Ultra 5 250K...
Intel reportedly ‘ca...harlan4096 — 11:27
Core Ultra 7 270K Plus and Ultra 5 250K ...
Intel’s Core Ultra...harlan4096 — 11:09
Adobe Acrobat Reader DC 2025.001.21184
Adobe Acrobat Read...harlan4096 — 10:45

[-]
Birthdays
Today's Birthdays
avatar (41)svoyaEnuct
Upcoming Birthdays
avatar (47)hapedDow
avatar (46)komriwat
avatar (38)showercurtains
avatar (49)PeterWhink
avatar (50)neuthrusBub
avatar (30)script6027529171
avatar (46)myhotseeve
avatar (46)Edwinmub
avatar (46)dimaWeami
avatar (39)TranoTymn
avatar (39)MezirLal
avatar (50)listfquoto
avatar (46)dima6sarPrave
avatar (38)Michaelaburi
avatar (46)dpascoal
avatar (51)Ronaldduh
avatar (39)legalgauch
avatar (44)Baihu
avatar (27)RaseinsLikes

[-]
Online Staff
There are no staff members currently online.

>