Filter
Locations
Result types
Type of company
Select company type
Industries
Select industry
Company status
Select company status preset
Number of employees
Min.
Max.
Founding year
Lock keywords
Exclude keywords
Optional keywords
Verified
Automated Malware Analysis | Malware Threat Intelligence
Automate the process of capturing malware and sending it to third-party analysis tools to quickly gather additional information and take action. Request a demo.
by Nehemiah Security
Verified
Advanced Malware Analysis Course near Washington DC — TrainACE
Are you struggling to advance in your IT career? TrainACE's advanced malware analysis course near Washington DC can earn more pay and respect.
by Academy of Computer Education
Verified
Reverse Engineering and Malware Analysis - Quick Heal Academy
Reverse Engineering and Malware Analysis | Reverse Engineering and Malware Analysis | Overview | About Programme | Highlights | Highlights of the programme | Content | Programme Content | Certificate to highlight the knowledge and skills you gain | Additional Information | Pre-Requisites | Laptop Requirements | FAQ’s | PROGRAMME FAQ’s | This course would be best suited for whom? | Related products | Cyber Security Professional | Python- for Extreme Hacking (Offensive Security) Professional | Network Security Professional | Cyber Law – The Indian Perspective
by Quick Heal Academy
Verified
Malware Analysis Training Near Washington DC with Local Experts — TrainACE
Struggling to advance in your IT career? Underappreciated? Our malware analysis training near Washington DC can earn you more pay and respect.
by Academy of Computer Education
Verified
Malware analysis by Open Threat Exchange | AT&T Cybersecurity
Malware analysis by Open Threat Exchange | Get free analysis of files and URLs that may be threats or you believe have been incorrectly classified. | Join the Open Threat Exchange™ (OTX) for free. | Submit files and URLs for instant malware and threat analysis. | View results within minutes — is this a threat or a false positive? | Malware and threat analysis by Alien Labs | Submit samples via the web or API | You choose to share results publicly or privately | Join OTX and submit files and URLs for analysis today.
by AT&T CyberSecurity
Verified
Malware Analysis - Black Cat Security
Malware analysis is the process of analyzing and understanding malicious software to determine its characteristics, behavior, and potential impact.
by Blackcat Security
Verified
Incident Response and Malware Analysis | India | Malware Analysis
Incident response and malware analysis will help you gauge the impact of cyber breaches. An investigation and recovery process need to be done by experts.
by eSec Forte Technologies
Verified
Malware Analysis - Cosaint Cyber LLC
Malware analysis is the process of understanding the behavior and purpose of a suspicious file or URL.
by Cosaint Cyber LLC
Verified
Digital forensics & Malware analysis | NVISO
As an addition to our 24/7 Incident Response services, we also offer ad-hoc investigation support. Depending on your own maturity, we can either perform full investigations…
by NVISO BE
Verified
Incident Response & Malware Analysis - Xiarch Cyber Security & Compliance Services
Incident Response & Malware Analysis · Address business vulnerability and assign roles and responsibility
by Xiarch Solutions Pvt Ltd
San Francisco, United States
1-10 Employees
2015
Our goal is to study the enemy so we can serve our customers with unique insights that you can’t get anywhere else. At Blackcat we believe the only way to sufficiently defend against cyber threat actors is to think like one. With a combined experience of 30+ years, we offer world class, bleeding-edge security services. Here’s just a taste of what we can offer in terms of offensive security! Here’s just a taste of what we can offer in terms of defensive security! View the full list of security services we provide and see the full extent of what we can provide for you!
+
Featured
Malware Analysis
... Malware analysis is the process of analyzing and understanding malicious software to determine its characteristics, behavior, and potential impact. ...
Rome, Italy
1-10 Employees
Sviluppiamo soluzioni custom per risolvere problemi nuovi in modo innovativo.
+
Featured
Malware analysis
... Malware analysis ...
Reinach, Switzerland
11-50 Employees
2011
Joe Sandbox Cloud is a web service based on Joe Sandbox Ultimate, hosted by Joe Security. The intelligent chain enables to sort out uninteresting samples and focus on the most interesting malware samples. Joe Sandbox Cloud reports are provided in all relevant export formats, ranging from common data exchange formats (XML, JSON) and document types (HTML, PDF) to malware security standards such as MAEC, CybOX, MISP and OpenIOC. We also offer integration with additional tools such as Viper and Malsub. Joe Sandbox Cloud delivers an IDA plugin which loads supplementary analysis data such as memory dumps and reconstructed PE files. To click through any installer Joe Sandbox Cloud offers an advanced OCR based click engine. No, this feature is only available in our in-house products, e.g. Joe Sandbox Cloud is offered as a subscription based service.
+
Featured
Deep Malware Analysis - Joe Sandbox
... Deep Malware Analysis - Joe ...
San Antonio, United States
1-10 Employees
2018
We are here to provide support when you need it the most. Our course offerings include Malware Analysis (Beginner and Advanced), Introduction to Reverse Engineering, Threat Modeling, and Web Application Security.
+
Featured
DFIR and Malware Analysis Consulting
... DFIR and Malware Analysis ...
Lyon, France
1-10 Employees
2021
Malcat is brought to you by Malcat EI, a one-man business located near Lyon, France. Malcat tries to combine all the features of these utilities in a single, powerful user interface. So yes, Malcat also embeds a disassembler and a decompiler like IDA, but the similarity ends there: they are two different types of tool which play in different categories. We have 10+ years of experience in the infosec field (mainly malware analysis and computer forensics) and a solid background in software development. And they are really good at it, provided you plan to spend several hours digging in the same binary. They want to know what is the file they are looking at and what it contains. And this is a different problematic, different enough to justify the need for another class of tool. It's up to us to convince you that Malcat's improvements are worth it.
+
Featured
Malcat - hexadecimal editor and disassembler for malware analysis
... Malcat - hexadecimal editor and disassembler for malware analysis ...
Bengaluru, India
1-10 Employees
2021
SecurWeave addresses the threat of advanced persistent malware. SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry. The founding team of SecurWeave has a combined experience of over 80+ years in embedded electronics, operating system, safety and mission critical systems and networking technologies for civil and military applications. SecurWeave's CHESS platforms are ideally suited to provide advanced security for mission-critical systems. SecurWeave’s configurable hardware-enforced safety & security (CHESS) platform is purpose-built to fill the gap in cyber defense against advanced malware thereby solving the long-standing global security gaps across endpoints, mobile phones, data centers and embedded systems. Dr Prem Chand is a visionary senior executive with over 45 years of experience in building and delivering high quality security products for defence, aerospace and ICT industry. Gopakumar has over two decades of experience in product development. Dinakar has extensive product development experience of close to two decades with various industry majors.
+
Featured
About Us | Solution To Advances Persistent Threat | SecurWeave
... Malware Analysis ...
Pune, India
11-50 Employees
2016
Quick Heal Academy (QHA) is a division of Quick Heal Technologies Limited, headquartered in Pune, Maharashtra, India. Quick Heal Academy (QHA) is a premier institute engaged in supporting and securing the cyberspace. QHA is committed to providing awareness around the ever-changing and evolving cyber security domain and creating security professionals that help deter the threats with the strong cyber skill-sets. QHA also offers online, classroom, corporate and need-based training courses with the objective to empower organizations in effectively addressing cyber security challenges and contribute towards strengthening the cyber security ecosystem. Ltd.) is one of the leading IT security solutions company. Each Quick Heal product is designed to simplify IT security management across the length and depth of devices and on multiple platforms. Our experts will help professionals understand their actual needs and construct a targeted training programme accordingly. Collaboration with educational institutions, Government organisations & law enforcement agencies for establishing innovative cybersecurity training programmes.
+
Featured
Reverse Engineering and Malware Analysis
... Reverse Engineering and Malware Analysis - Quick Heal ...
Columbia, United States
11-50 Employees
2016
We are collaborative, we are curious, and we are a team. We are hungry, driven, and passionate about building cool stuff that people will want to use. We are persistent and if we fail, we try another path. We believe in promoting work-life balance and we support our fellow teammates’ goals and objectives. We’re committed to a 1-1-1 philanthropic model, allowing us to engage our employees in their communities and support the effectiveness of the social idea. Beyond our dedication to philanthropy, we’ve also committed our time and resources, hosting job fairs to connect demobilizing national guardsmen with great industry jobs that utilize the experience gained from mobilization tours. TeamWorx Security offers elite training courses honed in partnership with the Department of Defense and National Guard Cyber Mission. Our instructors, veterans of US military and intelligence communities, deliver cutting-edge content continuously updated with best practices.
+
Featured
ON-DEMAND MALWARE ANALYSIS AND TRAINING FOR REMOTE AND DISTRIBUTED TEAMS.
... ON-DEMAND MALWARE ANALYSIS AND TRAINING FOR REMOTE AND DISTRIBUTED TEAMS. ...
Zaandam, Netherlands
11-50 Employees
2015
Hatching is based near to Amsterdam and governed by stringent national and European standards on privacy and security. This means that developing our sandbox is always our top priority. We can adapt our solutions quickly because of our compact organization size and flat organization structure. So, even if something isn’t possible out of the box, we make it work.
+
Featured
Hatching
... Automated malware analysis with Hatching Triage, the high-volume sandbox solution for SOCs, CERTs, SOARs, and MSSPs. ...
Brussels, Belgium
11-50 Employees
2013
NVISO was one of the only European participants in the inaugural MITRE Managed Security Services evaluations. During the evaluation, NVISO successfully detected and reported every step of the executed campaign. All of our services are GDPR-compliant and fully located in Europe. We are not here to offer you the same service forever. We are committed to providing you with peace of mind at all times. Our experts help you with security design and security assessments, ranging from deeply technical to managerial: we help you achieve a stronger security posture! Our experts in Cyber Architecture help you on your way to the cloud. Let us help you deliver secure applications while you focus on addressing client needs.
+
Featured
Digital forensics & Malware analysis
... Digital forensics & Malware analysis | ...
Malware Analysis is the process of determining the functionality, origin and potential impact of malicious software (malware) on a computer system or network. It is a critical part of cybersecurity, enabling organizations to identify, prevent, and respond to cyber threats and attacks. Malware Analysis includes reverse engineering techniques to uncover the code and behavior of malware, as well as analysis of potential vulnerabilities, system configurations, and other factors that can be used to assess the risk posed by the malware to an organization's assets.