Read the original article: Targeted Malware Reverse Engineering Workshop follow-up. Part 2
The Reverse Engineering webinar audience having been so active not only were we unable to address all the incoming questions online, we didn’t even manage to pack the rest of them in one blogpost. So here comes the second part of the webinar follow-up.
Read the original article: Targeted Malware Reverse Engineering Workshop follow-up. Part 2