[Security Masterminds] Breaking It Down to Bits & Bytes: Analyzing Malware To Understand the Cybercriminal


AI generated Image

In the episode, Roger discusses his early days of malware disassembly, the trials and tribulations of public speaking, and his magnum opus, his book about data-driven defense.Roger has a unique background that includes a degree in accounting, a CPA, being a paramedic, skydiving and base jumping, and most importantly, being an early pioneer in the computer security industry. By disassembling the code, security experts can determine the functions of the malicious code, the type of attack it is designed to execute, and any hidden backdoors or vulnerabilities that could exploit software. Disassembly can determine the signatures, which can detect similar malware in the future, allowing security experts to quickly identify and respond to threats before they can do any damage.

Source read time: 3 min - blog.knowbe4.com

Also offered in: Nederlands

More news for you