File malware analysis, forensics, reversing with Cerbero Seminar Event, is special event in conjunction with the E-SPIN 16th anniversary celebration. E-SPIN pleased to organize a seminar event focused on the file malware analysis, forensics, reversing with Cerbero Standard and Advanced. This event focuses on malware analysis and reverse engineering, forensics focus on high level product

It is a very common question asked, what is reverse engineering? The definition of reverse engineering is the act of disassemble and examine or analyze in detail (a product or device) to discover the concepts involved in manufacture usually in order to produce something similar. In mechanical engineering, the term reverse engineering (often abbreviated to

HEX-RAYS DECOMPILER The Hex-Rays Decompiler brings binary software analysis within reach of millions of programmers. It converts native processor code into a readable C-like pseudocode text. Unlike disassemblers, which perform the same task at a lower level, the decompiler output is concise, closer to the standard way programmers use to write applications. This alone can

Qualys Secure Seal Product Overview by E-SPIN

E-SPIN business partner Hex-Rays IDA Pro is the most regard and famous software analysis tool, which is a de facto standard in the software security industry, is an indispensable item in the toolbox of any serious software analyst and binary reverse engineer or malware analyst. Hex-Rays will continue to maintain IDA and ensure its continuous evolution

Rise of Joker A new android Malware

With the Joker (2019) new movie just show in the cinema, we get the news for rise of Joker – a new android malware spread across 472,000 mobile device in total. It is a new Android Trojan with malware dropper and spyware capabilities,  somehow being downloads as hidden inside mobile application for 427,000 in total

Qualys Secure Seal Product Overview by E-SPIN

Many of us are dependent on the computers and smart devices to complete our official, personal and household duties. The benefits are numerous but the threat posed by online fraudsters make it a scary place to venture without proper knowledge and protection. Cybercriminals create malicious programs called malware to rob legitimate users of their identity

Definition and Meaning of Reverse Engineering

Reverse engineering is the scientific method of taking something apart in order to figure out how it works. Reverse engineering has been used by innovators to determine a product’s structure in order to develop competing or interoperable products. Reverse engineering is also an invaluable teaching tool used by researchers, academics and students in many disciplines,

Sextortion come with ransomware and trojans in 2018

Sextortion come with ransomware and trojans in 2019. So how would you feel if you’d get a mail that would tell you someone has been recording you while you had fun surfing on porn pages? By now you should now already that it is all a scam though: those pesky mails that want to make you

CryptoMix Ransomware for Children’s Charity?

CryptoMix Ransomware for Children’s Charity? It is true or not? Before we go in detail to cover this cyber security threat, we should know what is CrytoMix  and how it working. CryptoMix is a ransomware strain that was first spotted in March 2016. In early 2017, its author(s) renamed CryptoMix to CryptoShield. The spread of

Worst malware and threat actors on 2018

What is the worst malware so far in 2018? The year isn’t quite over, but candidates for the role of “worst” have made themselves clear. According to a new report from Webroot, among the worst are three large botnets. The list starts with Emotet. Emotet is a Trojan that is primarily spread through spam emails


Now day Ransomware attacks give a bad impact to some of company and it still a serious threat. Ransomware is a type of malicious software from Cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. In 1991, a biologist spread PC Cyborg, the first ever ransomware,