Malware Analysis
Malware Analysis

Filter

Locations


Result types


Type of company


Industries


Company status

Number of employees

to

Founding year

to


Lock keywords

Exclude keywords

Optional keywords

Clear filters

Products and services for "Malware Analysis"

Image for Automated Malware Analysis | Malware Threat Intelligence
Product

Verified

Automated Malware Analysis | Malware Threat Intelligence

Automate the process of capturing malware and sending it to third-party analysis tools to quickly gather additional information and take action. Request a demo.

by Nehemiah Security

Image for Advanced Malware Analysis Course near Washington DC — TrainACE
Product

Verified

Advanced Malware Analysis Course near Washington DC — TrainACE

Are you struggling to advance in your IT career? TrainACE's advanced malware analysis course near Washington DC can earn more pay and respect.

by Academy of Computer Education

Image for Reverse Engineering and Malware Analysis - Quick Heal Academy
Product

Verified

Reverse Engineering and Malware Analysis - Quick Heal Academy

Reverse Engineering and Malware Analysis | Reverse Engineering and Malware Analysis | Overview | About Programme | Highlights | Highlights of the programme | Content | Programme Content | Certificate to highlight the knowledge and skills you gain | Additional Information | Pre-Requisites | Laptop Requirements | FAQ’s | PROGRAMME FAQ’s | This course would be best suited for whom? | Related products | Cyber Security Professional | Python- for Extreme Hacking (Offensive Security) Professional | Network Security Professional | Cyber Law – The Indian Perspective

by Quick Heal Academy

Image for Malware Analysis Training Near Washington DC with Local Experts — TrainACE
Product

Verified

Malware Analysis Training Near Washington DC with Local Experts — TrainACE

Struggling to advance in your IT career? Underappreciated? Our malware analysis training near Washington DC can earn you more pay and respect.

by Academy of Computer Education

Image for Malware analysis by Open Threat Exchange | AT&T Cybersecurity
Product

Verified

Malware analysis by Open Threat Exchange | AT&T Cybersecurity

Malware analysis by Open Threat Exchange | Get free analysis of files and URLs that may be threats or you believe have been incorrectly classified. | Join the Open Threat Exchange™ (OTX) for free. | Submit files and URLs for instant malware and threat analysis. | View results within minutes — is this a threat or a false positive? | Malware and threat analysis by Alien Labs | Submit samples via the web or API | You choose to share results publicly or privately | Join OTX and submit files and URLs for analysis today.

by AT&T CyberSecurity

Image for Malware Analysis - Black Cat Security
Service

Verified

Malware Analysis - Black Cat Security

Malware analysis is the process of analyzing and understanding malicious software to determine its characteristics, behavior, and potential impact.

by Blackcat Security

Image for Incident Response and Malware Analysis | India | Malware Analysis
Service

Verified

Incident Response and Malware Analysis | India | Malware Analysis

Incident response and malware analysis will help you gauge the impact of cyber breaches. An investigation and recovery process need to be done by experts.

by eSec Forte Technologies

Image for Malware Analysis - Cosaint Cyber LLC
Service

Verified

Malware Analysis - Cosaint Cyber LLC

Malware analysis is the process of understanding the behavior and purpose of a suspicious file or URL.

by Cosaint Cyber LLC

Image for Digital forensics & Malware analysis | NVISO
Service

Verified

Digital forensics & Malware analysis | NVISO

As an addition to our 24/7 Incident Response services, we also offer ad-hoc investigation support. Depending on your own maturity, we can either perform full investigations…

by NVISO BE

Image for Incident Response & Malware Analysis - Xiarch Cyber Security & Compliance Services
Service

Verified

Incident Response & Malware Analysis - Xiarch Cyber Security & Compliance Services

Incident Response & Malware Analysis · Address business vulnerability and assign roles and responsibility

by Xiarch Solutions Pvt Ltd

124 companies for "Malware Analysis"

Blackcat Security's Logo

San Francisco, United States

1-10 Employees

2015

Our goal is to study the enemy so we can serve our customers with unique insights that you can’t get anywhere else. At Blackcat we believe the only way to sufficiently defend against cyber threat actors is to think like one. With a combined experience of 30+ years, we offer world class, bleeding-edge security services. Here’s just a taste of what we can offer in terms of offensive security! Here’s just a taste of what we can offer in terms of defensive security! View the full list of security services we provide and see the full extent of what we can provide for you!

+

Featured

Service
Image for Malware Analysis

Malware Analysis

... Malware analysis is the process of analyzing and understanding malicious software to determine its characteristics, behavior, and potential impact. ...

Invicte.io's Logo

Rome, Italy

1-10 Employees

Sviluppiamo soluzioni custom per risolvere problemi nuovi in modo innovativo.

+

Featured

Core business
Image for Malware analysis

Malware analysis

... Malware analysis ...

Joe Security's Logo

Reinach, Switzerland

11-50 Employees

2011

Joe Sandbox Cloud is a web service based on Joe Sandbox Ultimate, hosted by Joe Security. The intelligent chain enables to sort out uninteresting samples and focus on the most interesting malware samples. Joe Sandbox Cloud reports are provided in all relevant export formats, ranging from common data exchange formats (XML, JSON) and document types (HTML, PDF) to malware security standards such as MAEC, CybOX, MISP and OpenIOC. We also offer integration with additional tools such as Viper and Malsub. Joe Sandbox Cloud delivers an IDA plugin which loads supplementary analysis data such as memory dumps and reconstructed PE files. To click through any installer Joe Sandbox Cloud offers an advanced OCR based click engine. No, this feature is only available in our in-house products, e.g. Joe Sandbox Cloud is offered as a subscription based service.

+

Featured

Core business
Image for Deep Malware Analysis - Joe Sandbox

Deep Malware Analysis - Joe Sandbox

... Deep Malware Analysis - Joe ...

maltechnica's Logo

San Antonio, United States

1-10 Employees

2018

We are here to provide support when you need it the most. Our course offerings include Malware Analysis (Beginner and Advanced), Introduction to Reverse Engineering, Threat Modeling, and Web Application Security.

+

Featured

Service
Image for DFIR and Malware Analysis Consulting

DFIR and Malware Analysis Consulting

... DFIR and Malware Analysis ...

Malcat's Logo

Lyon, France

1-10 Employees

2021

Malcat is brought to you by Malcat EI, a one-man business located near Lyon, France. Malcat tries to combine all the features of these utilities in a single, powerful user interface. So yes, Malcat also embeds a disassembler and a decompiler like IDA, but the similarity ends there: they are two different types of tool which play in different categories. We have 10+ years of experience in the infosec field (mainly malware analysis and computer forensics) and a solid background in software development. And they are really good at it, provided you plan to spend several hours digging in the same binary. They want to know what is the file they are looking at and what it contains. And this is a different problematic, different enough to justify the need for another class of tool. It's up to us to convince you that Malcat's improvements are worth it.

+

Featured

Core business
Image for Malcat - hexadecimal editor and disassembler for malware analysis

Malcat - hexadecimal editor and disassembler for malware analysis

... Malcat - hexadecimal editor and disassembler for malware analysis ...

SecurWeave Research Labs's Logo

Bengaluru, India

1-10 Employees

2021

SecurWeave addresses the threat of advanced persistent malware. SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry. The founding team of SecurWeave has a combined experience of over 80+ years in embedded electronics, operating system, safety and mission critical systems and networking technologies for civil and military applications. SecurWeave's CHESS platforms are ideally suited to provide advanced security for mission-critical systems. SecurWeave’s configurable hardware-enforced safety & security (CHESS) platform is purpose-built to fill the gap in cyber defense against advanced malware thereby solving the long-standing global security gaps across endpoints, mobile phones, data centers and embedded systems. Dr Prem Chand is a visionary senior executive with over 45 years of experience in building and delivering high quality security products for defence, aerospace and ICT industry. Gopakumar has over two decades of experience in product development. Dinakar has extensive product development experience of close to two decades with various industry majors.

+

Featured

Core business
Image for About Us | Solution To Advances Persistent Threat | SecurWeave

About Us | Solution To Advances Persistent Threat | SecurWeave

... Malware Analysis ...

Quick Heal Academy's Logo

Pune, India

11-50 Employees

2016

Quick Heal Academy (QHA) is a division of Quick Heal Technologies Limited, headquartered in Pune, Maharashtra, India. Quick Heal Academy (QHA) is a premier institute engaged in supporting and securing the cyberspace. QHA is committed to providing awareness around the ever-changing and evolving cyber security domain and creating security professionals that help deter the threats with the strong cyber skill-sets. QHA also offers online, classroom, corporate and need-based training courses with the objective to empower organizations in effectively addressing cyber security challenges and contribute towards strengthening the cyber security ecosystem. Ltd.) is one of the leading IT security solutions company. Each Quick Heal product is designed to simplify IT security management across the length and depth of devices and on multiple platforms. Our experts will help professionals understand their actual needs and construct a targeted training programme accordingly. Collaboration with educational institutions, Government organisations & law enforcement agencies for establishing innovative cybersecurity training programmes.

+

Featured

Product
Image for Reverse Engineering and Malware Analysis

Reverse Engineering and Malware Analysis

... Reverse Engineering and Malware Analysis - Quick Heal ...

TeamWorx Security's Logo

Columbia, United States

11-50 Employees

2016

We are collaborative, we are curious, and we are a team. We are hungry, driven, and passionate about building cool stuff that people will want to use. We are persistent and if we fail, we try another path. We believe in promoting work-life balance and we support our fellow teammates’ goals and objectives. We’re committed to a 1-1-1 philanthropic model, allowing us to engage our employees in their communities and support the effectiveness of the social idea. Beyond our dedication to philanthropy, we’ve also committed our time and resources, hosting job fairs to connect demobilizing national guardsmen with great industry jobs that utilize the experience gained from mobilization tours. TeamWorx Security offers elite training courses honed in partnership with the Department of Defense and National Guard Cyber Mission. Our instructors, veterans of US military and intelligence communities, deliver cutting-edge content continuously updated with best practices.

+

Featured

Product
Image for ON-DEMAND MALWARE ANALYSIS AND TRAINING FOR REMOTE AND DISTRIBUTED TEAMS.

ON-DEMAND MALWARE ANALYSIS AND TRAINING FOR REMOTE AND DISTRIBUTED TEAMS.

... ON-DEMAND MALWARE ANALYSIS AND TRAINING FOR REMOTE AND DISTRIBUTED TEAMS. ...

Hatching's Logo

Zaandam, Netherlands

11-50 Employees

2015

Hatching is based near to Amsterdam and governed by stringent national and European standards on privacy and security. This means that developing our sandbox is always our top priority. We can adapt our solutions quickly because of our compact organization size and flat organization structure. So, even if something isn’t possible out of the box, we make it work.

+

Featured

Core business
Image for Hatching

Hatching

... Automated malware analysis with Hatching Triage, the high-volume sandbox solution for SOCs, CERTs, SOARs, and MSSPs. ...

NVISO BE's Logo

Brussels, Belgium

11-50 Employees

2013

NVISO was one of the only European participants in the inaugural MITRE Managed Security Services evaluations. During the evaluation, NVISO successfully detected and reported every step of the executed campaign. All of our services are GDPR-compliant and fully located in Europe. We are not here to offer you the same service forever. We are committed to providing you with peace of mind at all times. Our experts help you with security design and security assessments, ranging from deeply technical to managerial: we help you achieve a stronger security posture! Our experts in Cyber Architecture help you on your way to the cloud. Let us help you deliver secure applications while you focus on addressing client needs.

+

Featured

Service
Image for Digital forensics & Malware analysis

Digital forensics & Malware analysis

... Digital forensics & Malware analysis | ...

Show More

„Malware Analysis“

Malware Analysis is the process of determining the functionality, origin and potential impact of malicious software (malware) on a computer system or network. It is a critical part of cybersecurity, enabling organizations to identify, prevent, and respond to cyber threats and attacks. Malware Analysis includes reverse engineering techniques to uncover the code and behavior of malware, as well as analysis of potential vulnerabilities, system configurations, and other factors that can be used to assess the risk posed by the malware to an organization's assets.