These sites can give you indications when analysing malicious files . If you are a target of an APT and care about the privacy of your organisation’s information, then do not upload the file, instead use the hash.
I am an Information security Engineer with a strong background in network and Cloud computing.
I have done work With FTK imager and enjoy improving my know-how in my spare time. My aim is to fight cybercriminal and help end users to enjoy the Internet freely
View more posts