We’ve partnered with popular YouTube tech expert, Leo of The PC Security Channel, to create a brand new video series that offers deep insight into the world of cybersecurity.
In the series, Leo, who also works here at Emsisoft as a Malware Analyst, examines how to decrypt ransomware, the most effective malware analysis tools, best practices for hardening Windows 10 and the threat hunting techniques he uses on a daily basis as a cybersecurity professional.
Watch the videos below or click here to see the full playlist.
Video #1: How to Decrypt Ransomware
Using the Jigsaw ransomware family as an example, this video discusses the concept of data encryption and possible decryption techniques. The video explores a variety of decryption methods, including free decryption tools, analyzing memory dumps and using assisted brute force to crack poorly implemented ransomware.
Video #2: Best Malware Analysis Tools
In the second video in the series, Leo highlights the best free software for analyzing malware. From beginner-friendly tools to sophisticated applications designed for advanced researchers, the video covers a wide range of programs that can be used to analyze new .exe files and find malicious processes. The video discusses dynamic analysis tools such as Process Explorer, Autoruns, Process Monitor, Regshot and OllyDbg, as well as static analysis tools such as PeStudio, dnSpy and Ghidra.
Video #3: Advanced VirusTotal Tutorial
VirusTotal is a popular free online service that analyzes suspicious files and URLs, and automatically shares malware samples with the wider cybersecurity community. This video discusses how to use VirusTotal’s advanced functions to get greater insight into a suspected threat.
Video #4: Windows 10 Hardening
This video focuses on how users can configure Windows 10 to reduce a system’s attack surface. The video discusses a range of easy-to-implement techniques, including utilizing the principle of least privilege, configuring system updates, disabling unnecessary features and changing various settings in Windows Security to improve the resilience of the operating system.
Video #5: Threat Hunting Tutorial
This video provides a comprehensive overview of the different types of threat hunting, including hunting existing threats within an organization, proactively hunting threats on the Internet using tools like YARA rules and using traps in a sandbox environment to detect threats.
Where to go from here?
If you’re looking for more malware analysis tutorials, we recommend our Manual Malware Removal series. The series features manual malware removal tips and techniques from Emsisoft’s resident security experts.
Emsisoft Enterprise Security + EDR
Robust and proven endpoint security solution for organizations of all sizes. Start free trial