Reverse Engineering Malware 8
- Compromised store spread Lumma Stealer using a fake CAPTCHA
- Ghidra workflow
- x86 assembly code basics for reverse engineers
- Beginning malware analysis
- Ghidra setup guide
- How to build a malware analysis lab
- Free resources for malware researchers
- Emotet malspam campaign exploits reliance on magic for file type detection