
Neil Fox
Neil is a cyber security professional specializing in incident response and malware analysis. He also creates cyber security content for his YouTube channel and blog at 0xf0x.com.
-
Data Security
Apr 12, 2022
How to Use Volatility for Memory Forensics and Analysis
If you work in incident response you understand how critical it is to pull forensically sound evidence from compromised devices as soon as possible. This is often in the form of logs or hard disk images.
Neil Fox
8 min read
-
Data Security
Mar 21, 2022
How to Use Ghidra to Reverse Engineer Malware
There are numerous tools freely available to cybersecurity professionals to assist in analyzing malware. Ghidra was first released a couple of years ago and has proved to be relatively popular due to it being a free tool that can be used to disassemble malware.
Neil Fox
7 min read
-
Data Security
Feb 25, 2022
Common Types of Malware
It’s no secret that malware is a huge problem, whether it be an infected laptop that you use for home banking and watching Netflix, all the way to multi-million-pound organizations that store customer credit card and banking details. But what happens once a machine is infected with malware? The answer to that question depends on what type of malware has infected the device as there are different types of malware that each have their own malicious characteristics.
Neil Fox
7 min read
-
Data Security
Oct 06, 2021
PeStudio Overview: Setup, Tutorial and Tips
PeStudio is a tool used for statically analyzing malware and is one of my favourite tools for malware analysis.
Neil Fox
6 min read
-
Security Bulletins
Jul 26, 2021
Memory Forensics for Incident Response
When responding to a cybersecurity incident I’ve always found memory forensics to be a great skill to have. By capturing the memory of a compromised device you can quickly perform some analysis to identify potential malware and gather IOC’s which can then be used to identify other compromised devices.
Neil Fox
6 min read
-
Data Security
Jun 02, 2021
Process Hacker: Advanced Task Manager Overview
Process Hacker is a great tool for monitoring and investigating processes created by a piece of malware. It is a popular malware analysis tool amongst security professionals as it can extract a wealth of information from processes that are running on a device.
Neil Fox
5 min read
-
Data Security
May 26, 2021
Cuckoo Sandbox Overview
A Cuckoo Sandbox is an open-source tool that can be used to automatically analyze malware.
Neil Fox
7 min read
-
Data Security
May 21, 2021
How to Analyze Malware with x64dbg
This is the fourth and final article in a series of blog posts that serve as an x64dbg tutorial. In this article, we will be taking all the knowledge we have learned so far to demonstrate some techniques that can be used when reverse engineering a piece of malware.
Neil Fox
6 min read
-
Data Security Security Bulletins
May 17, 2021
YARA Rules Guide: Learning this Malware Research Tool
YARA rules are used to classify and identify malware samples by creating descriptions of malware families based on textual or binary patterns.
Neil Fox
7 min read
-
Data Security
Mar 23, 2021
Stack Memory: An Overview (Part 3)
Stack memory is a section in memory used by functions to store data such as local variables and parameters that will be used by the malware to perform its nefarious activity on a compromised device.
Neil Fox
9 min read
-
Data Security PowerShell Security Bulletins
Mar 22, 2021
How to Use Autoruns to Detect and Remove Malware on Windows
Understanding how to use Autoruns means you may be able to detect if your home PC is infected with unwanted software.
Neil Fox
6 min read
-
Data Security Security Bulletins Threat Research
Mar 17, 2021
How to Unpack Malware with x64dbg
In a previous blog post, I explained what x64dbg is and also broke down some of the features of the tool and why they are useful for malware analysis. This article will serve as an x64dbg tutorial in which I will cover the methodology I use when reverse engineering malware and demonstrate how to use the tool to unpack a malware sample.
Neil Fox
11 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital