By |2019-06-14T12:12:00+00:00June 14th, 2019|

A cryptocurrency miner application which uses a computer’s resources (central processing unit, memory) without the consent of the owner. The [...]


By |2019-06-14T12:11:19+00:00June 14th, 2019|

Very simply put, cryptocurrency is best understood as a form of digital money. The most famous example is Bitcoin, though [...]

Script files

By |2019-06-14T12:10:13+00:00June 14th, 2019|

Most executable file types are binary files. Binary files are first written as a source code, then compiled into binary [...]

Fileless attack

By |2019-06-14T12:08:35+00:00June 14th, 2019|

Although a typical malware attack on the Windows platform involves dropping an executable file on the disk, a fileless attack [...]

DoS attacks

By |2019-06-14T12:08:08+00:00June 14th, 2019|

DoS stands for "Denial-of-Service". DoS attacks aim to make a target resource unreachable or incapable of handling its standard tasks [...]


By |2019-06-14T12:07:44+00:00June 14th, 2019|

A special type of malware with only one intent: Destruction. Wiper malware sometimes act as ransomware by encrypting files on [...]

Malware analysis

By |2019-06-14T12:06:54+00:00June 14th, 2019|

The process of reversing a malicious binary or code, or observing a malware's behaviour during running. Since running malware is [...]