Websec Blog

Find tutorials, guides, news updates and learn about security best practices.
detective search icon virus icon
cover image for article: Static malware analysis of PDF files

Static malware analysis of PDF files

We will do static analysis on PDF documents, including analysis of embedded strings.

cover image for article: Intro to static malware analysis

Intro to static malware analysis

Static code analysis is the technique of studying the source code of a program without running it. This can be valuable for malware reverse engineering, as it can assist discover dangerous code.

cover image for article: What is DLL Hijacking? And How Does it Work?

What is DLL Hijacking? And How Does it Work?

DLL hijacking is a method in which a trusted and legit program is tricked into loading a malicious DLL.

cover image for article: How to Get Into Cybersecurity

How to Get Into Cybersecurity

Looking to learn how to break into cybersecurity? Search no further! This article covers everything you need to know about getting into cybersecurity.

cover image for article: Top 10 Best Security Tools for Pentesting

Top 10 Best Security Tools for Pentesting

This article covers the top 10 best security tools for pentesting. Learn the key features of each tool and where to hire the best pentesting experts.

cover image for article: 5 Major Types of Phishing Attacks

5 Major Types of Phishing Attacks

This article covers the five major types of phishing attacks. Read to learn how phishing attacks work and how to prevent various types of phishing.

Load More