Malware stains such as Agent Tesla, AZORult, Formbook, Ursnif, LokiBot, MOUSEISLAND, NanoCore, Qakbot, Remcos, TrickBot, and GootLoader were observed. Although most of these variants have been active for more than five years, the attacks show that there is constant development of these variants to improve stealth, discreetness, and impact.
Moreover, the attacks on IoT devices, supply chain, nation–state (Russia–Ukraine conflict) and mobile devices have been on the rise.
It is crucial to study the strategies employed in such attacks by malware to detect them. In this course you will learn Incident response, forensic analysis, malware detection and a reverse engineering.