Tools & TutorialsMEDIUM

JSAC2026: Essential Workshops on Email Security and Malware Analysis

JPJPCERT/CCYesterday, 2:00 AM
JSAC2026malware analysisEML Analyzerreverse engineeringcybersecurity workshops
🎯

Basically, experts are sharing hands-on techniques to analyze malicious emails and malware at a cybersecurity event.

Quick Summary

At JSAC2026, cybersecurity experts shared valuable techniques for analyzing malicious emails and malware. Participants learned hands-on skills to better protect themselves and their organizations. These workshops highlight the importance of staying informed in an ever-evolving cyber threat landscape.

What Happened

At JSAC2026, cybersecurity professionals gathered to enhance their skills through various workshops. These sessions focused on analyzing malicious emails and reverse engineering malware, providing practical insights for incident response. The workshops featured expert speakers who shared their knowledge and tools to tackle real-world threats.

The first workshop, led by Manabu Niseki and Michał Praszmo, centered on using the EML Analyzer? to triage malicious emails. They began by explaining email architecture and attack techniques, emphasizing the importance of understanding email headers. Participants learned about authentication technologies like SPF?, DKIM?, and DMARC?, which help verify the legitimacy of emails. In the second half, attendees engaged in hands-on analysis using the EML Analyzer?, an open-source tool that helps visualize email data.

The second workshop, conducted by Mark Lim from Palo Alto Networks, focused on advanced malware reverse engineering?. Participants examined two malware families, specifically Guloader and Gremlin, in a multi-stage attack scenario. Lim guided them through the analysis of VBS files, PowerShell scripts, and shellcode, while also addressing anti-analysis techniques?. This step-by-step approach reinforced both conceptual understanding and practical skills.

Lastly, Akihiro Yoshitake and his colleagues introduced a workshop on analyzing .NET AOT malware. They explained the challenges of working with binaries that lack IL code and metadata, which are common in traditional .NET malware. Through hands-on exercises with tools like Ghidra? and IDA Pro?, participants learned to identify functions and improve code readability, ultimately enhancing their analysis capabilities.

Why Should You Care

Understanding how to analyze malicious emails and malware is crucial for anyone who uses technology today. If you rely on email for communication or use software on your devices, you could be a target for cyber threats. Learning these skills can help protect your personal information and your company's data.

Think of it like learning to recognize a phishing email or a suspicious software download. Just as you wouldn’t open a door to a stranger, you shouldn’t click on unknown links or attachments. By attending these workshops, participants are better equipped to defend themselves and their organizations against cyber attacks.

What's Being Done

The JSAC2026 workshops are part of a broader effort to enhance cybersecurity skills among professionals. Experts are actively sharing knowledge and tools to combat evolving threats. Here’s what participants and organizations can do right now:

  • Engage in hands-on training sessions to improve skills.
  • Utilize tools like EML Analyzer?, Ghidra?, and IDA Pro? for practical analysis.
  • Stay updated on the latest malware trends and techniques.

Experts are watching for advancements in malware techniques and the effectiveness of new analysis tools as they emerge.

💡 Tap dotted terms for explanations

🔒 Pro insight: The focus on EML analysis and .NET AOT malware reflects a critical shift in attack vectors — expect increased targeting of these areas.

Original article from

JPCERT/CC

Read Full Article

Related Pings

LOWTools & Tutorials

Eyeris Zen: Your New Eye Massager and Meditation Buddy

The Renpho Eyeris Zen eye massager is here to help! It eases headaches and eye strain while offering meditation sessions. Perfect for those who spend long hours on screens, this device could change your relaxation game. Dive into a new way to unwind!

ZDNet Security·Today, 3:00 AM
LOWTools & Tutorials

Bose QuietComfort Ultra: The Pinnacle of Headphone Excellence

Bose has launched its QuietComfort Ultra Headphones (2nd Gen), boasting enhanced sound and noise cancellation. Perfect for music lovers, these headphones promise an immersive audio experience. Don't miss out on the chance to elevate your listening game with Bose's latest innovation.

ZDNet Security·Today, 2:45 AM
LOWTools & Tutorials

8GB RAM: Still Enough for Macs in 2026?

Many Mac users are questioning if 8GB of RAM is enough for 2026. The short answer is yes! While Windows users may struggle, Macs are optimized for efficiency. If you're a casual user, you're in good shape.

ZDNet Security·Today, 2:00 AM
MEDIUMTools & Tutorials

Firefox Partners with Anthropic AI to Combat RAM Issues

Firefox is collaborating with Anthropic AI to tackle RAM-related bugs. Users may face issues like crashes or slowdowns. Keeping your browser updated is crucial for a smoother experience.

The Register Security·Yesterday, 8:41 PM
LOWTools & Tutorials

Nothing Headphone (a): Design Meets Functionality

The Nothing Headphone (a) has arrived, combining unique design with impressive battery life. Perfect for music lovers and style enthusiasts alike, these headphones offer great value. Check out reviews and see if they fit your audio needs!

ZDNet Security·Yesterday, 8:00 PM
LOWTools & Tutorials

SanDisk MicroSD Card: 20,000 Hours of Endurance Tested!

SanDisk has launched a microSD card designed for heavy use, boasting an impressive 20,000 hours of endurance. Ideal for dash cams and security cameras, this card ensures your important footage is safe. Users can trust its reliability, making it a top choice in the market.

ZDNet Security·Yesterday, 6:40 PM