5 tips for building an effective security operations center (SOC)

Credit to Author: Gilad Maayan| Date: Fri, 13 Dec 2019 16:00:00 +0000

A security operations center (SOC) can significantly improve an organization’s security posture, but it’s not a perfect solution and can be challenging to implement. Read on to learn how to clear hurdles and build an effective SOC team.

Categories:

Tags:

(Read more…)

The post 5 tips for building an effective security operations center (SOC) appeared first on Malwarebytes Labs.

Read more

Hidden Bee: Let’s go down the rabbit hole

Credit to Author: hasherezade| Date: Fri, 31 May 2019 17:32:57 +0000

The complex and sophisticated custom malware, Hidden Bee, is a Chinese cryptominer that recently released an updated sample. We unpack the sample to look at the functionality of its loader and compare it against earlier versions.

Categories:

Tags:

(Read more…)

The post Hidden Bee: Let’s go down the rabbit hole appeared first on Malwarebytes Labs.

Read more

Reversing malware in a custom format: Hidden Bee elements

Credit to Author: hasherezade| Date: Thu, 30 Aug 2018 15:41:34 +0000

When we recently analyzed payloads related to Hidden Bee (dropped by the Underminer EK), we noticed something unusual. After reversing the malware, we discovered that its authors actually created their own executable format. Follow our step-by-step analysis for a closer look.

Categories:

Tags:

(Read more…)

The post Reversing malware in a custom format: Hidden Bee elements appeared first on Malwarebytes Labs.

Read more