Media Summary: In case you didn't have time for our 2-minutes introduction to the topic ( :) More information at: ... Read our blog post about Attachments in Phishing In this video we introduce the formula view, which is extremely useful when

Malicious Excel Document Analysis In Cerbero Suite - Detailed Analysis & Overview

In case you didn't have time for our 2-minutes introduction to the topic ( :) More information at: ... Read our blog post about Attachments in Phishing In this video we introduce the formula view, which is extremely useful when You can find the script used in the video on our blog: https:// The first of the short instructional videos that we're currently producing. If you like the idea, make sure to like the video! Check out ...

Photo Gallery

Malicious Excel Document Analysis in Cerbero Suite
28-Seconds Malicious Microsoft Excel Document Analysis
🎥 Getting Started Analyzing Malicious Excel Documents
20-Seconds Excel Malware Analysis
Malicious PDF Analysis in Cerbero Suite
Example of opening a malicious Excel file
File Analysis Using Cerbero Suite
Blitz 19 Seconds Excel Malware Analysis
50-Seconds Obfuscated Excel Malware Analysis
Malicious Office Document DDE Analysis in 30 seconds
IcedId Excel Malware 50-Seconds Complete Analysis
Malicious Email (EML) Analysis
View Detailed Profile
Malicious Excel Document Analysis in Cerbero Suite

Malicious Excel Document Analysis in Cerbero Suite

This video is an introduction of how to

28-Seconds Malicious Microsoft Excel Document Analysis

28-Seconds Malicious Microsoft Excel Document Analysis

In case you didn't have time for our 2-minutes introduction to the topic (https://youtu.be/pSWfD-lMf4I). :) More information at: ...

🎥 Getting Started Analyzing Malicious Excel Documents

🎥 Getting Started Analyzing Malicious Excel Documents

Get started

20-Seconds Excel Malware Analysis

20-Seconds Excel Malware Analysis

... a better audio here: https://youtu.be/eIK3KAcVtXw Using

Malicious PDF Analysis in Cerbero Suite

Malicious PDF Analysis in Cerbero Suite

How to quickly inspect a

Example of opening a malicious Excel file

Example of opening a malicious Excel file

Read our blog post about Attachments in Phishing https://www.hoxhunt.com/blog/attachments-in-phishing-102/

File Analysis Using Cerbero Suite

File Analysis Using Cerbero Suite

If you're not yet familiar with

Blitz 19 Seconds Excel Malware Analysis

Blitz 19 Seconds Excel Malware Analysis

Using

50-Seconds Obfuscated Excel Malware Analysis

50-Seconds Obfuscated Excel Malware Analysis

In this video we introduce the formula view, which is extremely useful when

Malicious Office Document DDE Analysis in 30 seconds

Malicious Office Document DDE Analysis in 30 seconds

Analysis

IcedId Excel Malware 50-Seconds Complete Analysis

IcedId Excel Malware 50-Seconds Complete Analysis

This

Malicious Email (EML) Analysis

Malicious Email (EML) Analysis

Cerbero Suite

2-Minutes QakBot Excel Malware Analysis

2-Minutes QakBot Excel Malware Analysis

You can find the script used in the video on our blog: https://

3-Minutes QakBot Excel Malware Analysis

3-Minutes QakBot Excel Malware Analysis

More information at: https://

Malware Analysis of Malicious Documents

Malware Analysis of Malicious Documents

Access the course here: https://www.udemy.com/course/

🎥 LIVE: Getting Started Analyzing Malicious Office Documents

🎥 LIVE: Getting Started Analyzing Malicious Office Documents

Learn how to get started

How to analyze JPEG files in Cerbero Suite

How to analyze JPEG files in Cerbero Suite

The first of the short instructional videos that we're currently producing. If you like the idea, make sure to like the video! Check out ...