The following pages and posts are tagged with:
|How to Clean a Malware-Infected Windows Machine
|A Windows computer is suspected to be infected with malware, or the computer behaves abnormally, with some common symptoms - unusual slowness, application er...
|Removing Adware from a Windows Machine
|The client's browser is showing ads that stop them from doing what they need to do, for instance when trying to access documents from Google drive
|Report and Disable Malicious C&C Server
|A C&C server is identified by malware researchers, clients, or partners to be linked to a phishing campaign or to malware targeting civil society groups;...
|Advanced Threats Triage Workflow
|The client has received suspicious messages, or suspicious behaviour has been observed in the client's devices or network
|How to Recognize Spear-Phishing and What to Do
|A user at risk has received a phishing message that seems targeted
|Analysing Suspicious PDF Files
|A client has received a suspicious PDF file and needs to analyse it to make sure it does not contain malicious code.
|MS Office Files static analysis
|How to analyze MS Office Files to find signs of malicious behavior.
|Hardening VMs for static malware analysis
|How to prepare a VM for the purpose of static behavioral analysis of malware.