Works cited:
1. What is Malware Analysis? - Threat Intelligence Lab, accessed March 13, 2025,
What is Malware Analysis? - Threat Intelligence Lab
2. Simulated vs. Real Malware: What You Need To Know - Darktrace, accessed March 13, 2025,
Simulated vs. Real Malware: What You Need To Know
3. 8 most common malware evasion techniques - Gatefy, accessed March 13, 2025,
8 most common malware evasion techniques - Gatefy
4. What Are Some Malware Evasion Techniques? - RiskXchange, accessed March 13, 2025,
What Are Some Malware Evasion Techniques? | RiskXchange
5. What is an infection chain? | Kaspersky IT Encyclopedia, accessed March 13, 2025,
Infection chain
6. TryHackMe Cyber Kill Chain Room - Medium, accessed March 13, 2025,
7. Malware Protection: Types, Tools and Best Practices - Perception Point, accessed March 13, 2025,
Malware Protection: Types, Tools and Best Practices
8. Top 6 Ransomware Attack Vectors (And how to Prevent them in the Enterprise), accessed March 13, 2025,
Top 6 Ransomware Attack Vectors (And how to Prevent them in the Enterprise)
9. What are Infection vectors? - Exploring Cyberattack Pathways, accessed March 13, 2025,
What are Infection vectors? - Exploring Cyberattack Pathways
10. (PDF) Measuring Drive-by Download Defense in Depth - ResearchGate, accessed March 13, 2025,
https://www.researchgate.net/publication/297612536_Measuring_Drive-by_Download_Defense_in_Depth
11. 8 Common Types of Cyber Attack Vectors and How to Avoid Them | Balbix, accessed March 13, 2025,
8 Common Types of Cyber Attack Vectors and How to Avoid Them
12. What Is Malware? - Palo Alto Networks, accessed March 13, 2025,
What Is Malware?
13. Supply chain attacks - Microsoft Defender for Endpoint, accessed March 13, 2025,
Supply chain attacks - Microsoft Defender for Endpoint
14. Exposing Infection Techniques Across Supply Chains and Codebases | Trend Micro (US), accessed March 13, 2025,
Exposing Infection Techniques Across Supply Chains and Codebases
15. What is Malware Detection? - Xcitium, accessed March 13, 2025,
What is Malware Detection? | Malware Detection Explained
16. Fileless Malware Evades Detection-Based Security - Morphisec, accessed March 13, 2025,
Fileless Malware Evades Detection-Based Security
17. What is Fileless Malware? | CrowdStrike, accessed March 13, 2025,
What is Fileless Malware? | CrowdStrike
18. 10 Common Malware Examples and Types You Should Know About - Perception Point, accessed March 13, 2025,
10 Common Malware Examples and Types You Should Know About
19. Hidden Malware and Ransomware: 6 Places to Check (+ How to Prevent It) - Cimcor, accessed March 13, 2025,
Hidden Malware and Ransomware: 6 Places to Check (+ How to Prevent It)
20. When Guardians Become Predators: How Malware Corrupts the Protectors - Trellix, accessed March 13, 2025,
https://www.trellix.com/blogs/resea...redators-how-malware-corrupts-the-protectors/
21. New SocGholish Infection Chain Discovered - ReliaQuest, accessed March 13, 2025,
New SocGholish Infection Chain Discovered - ReliaQuest
22. Undercover miner: how YouTubers get pressed into distributing SilentCryptoMiner as a restriction bypass tool - Securelist, accessed March 13, 2025,
SilentCryptoMiner distributed as a bypass tool
23. How Microsoft identifies malware and potentially unwanted applications, accessed March 13, 2025,
How Microsoft identifies malware and potentially unwanted applications - Microsoft's unified security operations platform
24. Static Malware Analysis vs Dynamic Malware Analysis - Comparison Chart - Malwation, accessed March 13, 2025,
Static Malware Analysis vs Dynamic Malware Analysis - Comparison Chart
25. 5 Common Evasion Techniques in Malware - ANY.RUN's Cybersecurity Blog, accessed March 13, 2025,
5 Common Evasion Techniques in Malware - ANY.RUN's Cybersecurity Blog
26. Unmasking Malware Evasion Techniques: A Deep Dive - Infosec, accessed March 13, 2025,
Unmasking Malware Evasion Techniques: A Deep Dive | Infosec
27. AI Malware: Types, Real Life Examples, and Defensive Measures - Perception Point, accessed March 13, 2025,
AI Malware: Types, Real Life Examples, and Defensive Measures
28. Antivirus or behavioural analysis (reactive vs. proactive) - Baker Tilly, accessed March 13, 2025,
Antivirus or behavioural analysis (reactive vs. proactive) | Baker Tilly
29. Sandbox detection and evasion techniques. How malware has evolved over the last 10 years - Positive Technologies, accessed March 13, 2025,
Sandbox detection and evasion techniques. How malware has evolved over the last 10 years
30. Malware Sandbox Evasion Techniques: A Comprehensive Guide - VMRay, accessed March 13, 2025,
https://www.vmray.com/sandbox-evasion-techniques/
31. Malware: How it hides, detects, and reacts - I Help Women In Tech Earn More Money, accessed March 13, 2025,
https://www.keirstenbrager.tech/malware-how-it-hides-detects-and-reacts/
32. Types, Examples, and How Modern Anti-Malware Works - Perception Point, accessed March 13, 2025,
https://perception-point.io/guides/malware/malware-types-examples-how-modern-anti-malware-works/
33. What Is Ransomware? Attack Types, Examples, Detection, and Prevention, accessed March 13, 2025,
https://perception-point.io/guides/...tack-types-examples-detection-and-prevention/
34. Top 7 Most Common Ransomware Attack Vectors - BitSight Technologies, accessed March 13, 2025,
https://www.bitsight.com/blog/top-7-ransomware-attack-vectors-and-how-avoid-becoming-victim
35. 12 Types of Malware + Examples That You Should Know | CrowdStrike, accessed March 13, 2025,
https://www.crowdstrike.com/en-us/cybersecurity-101/malware/types-of-malware/
36. Malware Attacks: Top 10 Malware Types and Real Life Examples - Perception Point, accessed March 13, 2025,
https://perception-point.io/guides/...-top-10-malware-types-and-real-life-examples/
37. The Importance of Defense in Depth & Comprehensive Testing | Forvis Mazars, accessed March 13, 2025,
https://www.forvismazars.us/forsigh...nce-of-defense-in-depth-comprehensive-testing
38. The Importance of Defense in Depth - Datto, accessed March 13, 2025,
https://www.datto.com/blog/defense-in-depth/
39. Mitigating malware and ransomware attacks - NCSC.GOV.UK, accessed March 13, 2025,
https://www.ncsc.gov.uk/guidance/mitigating-malware-and-ransomware-attacks
40. Building a Robust Defense-in-Depth Architecture for Digital Transformation - LevelBlue, accessed March 13, 2025,
https://levelblue.com/blogs/securit...depth-architecture-for-digital-transformation
41. Emerging Threat: The ClickFix Infection Chain and Lumma Stealer Malware - CybaVerse, accessed March 13, 2025,
https://www.cybaverse.co.uk/resourc...fix-infection-chain-and-lumma-stealer-malware
42. What are Attack Vectors: Definition & Vulnerabilities | CrowdStrike, accessed March 13, 2025,
https://www.crowdstrike.com/en-us/cybersecurity-101/threat-intelligence/attack-vector/
43. Using Ethical Scareware as an End User Security Training Tool - Redmondmag.com, accessed March 13, 2025,
https://redmondmag.com/Articles/202...re-as-an-End-User-Security-Training-Tool.aspx
44. Network Security Monitoring: A Comprehensive Guide - Tailwind, accessed March 13, 2025,
https://www.tailwindvoiceanddata.com/blog/network-security-monitoring-a-comprehensive-guide
45. Top 9 Network Security Monitoring Tools for Identifying Potential Threats - AlgoSec, accessed March 13, 2025,
https://www.algosec.com/blog/network-security-monitoring-tools
46. Network Security Monitoring Software—NSM Tools | SolarWinds, accessed March 13, 2025,
https://www.solarwinds.com/security-event-manager/use-cases/network-security-monitoring
47. How to Detect Malicious Activity on Your Network: A Step-by-Step Guide - Timus Networks, accessed March 13, 2025,
https://www.timusnetworks.com/how-to-detect-malicious-activity-on-your-network-a-step-by-step-guide/
48. Network Monitoring as an Essential Component of IT Security - Paessler, accessed March 13, 2025,
https://www.paessler.com/learn/whitepapers/security
49. The Malware Masquerade: The Art of Initial Access & Evasion Techniques - Approach Cyber, accessed March 13, 2025,
https://www.approach-cyber.com/blog...art-of-initial-access-and-evasion-techniques/
50. Malware Analysis: Steps & Examples - CrowdStrike, accessed March 13, 2025,
https://www.crowdstrike.com/en-us/cybersecurity-101/malware/malware-analysis/
51. What is Breach and Attack Simulation (BAS)? - SentinelOne, accessed March 13, 2025,
https://www.sentinelone.com/cybersecurity-101/cybersecurity/breach-and-attack-simulation-bas/
52. Real-World Protection Test February-May 2024 - AV-Comparatives, accessed March 13, 2025,
https://www.av-comparatives.org/tests/real-world-protection-test-february-may-2024/
53. Scenario-Based Testing - Redscan, accessed March 13, 2025,
https://www.redscan.com/services/scenario-based-testing/
54. Realistic cyber security testing - SE LABS ®, accessed March 13, 2025,
https://selabs.uk/blog/realistic-cyber-security-testing/
55. What is Attack Simulation? - Keepnet Labs, accessed March 13, 2025,
https://keepnetlabs.com/blog/predict-prevent-protect
56. Infection Monkey - Akamai, accessed March 13, 2025,
https://www.akamai.com/infectionmonkey
57. 7 Benefits Of Dynamic Malware Analysis - RiskXchange, accessed March 13, 2025,
https://riskxchange.co/1006943/benefits-of-dynamic-malware-analysis/
58. Why Your Business Needs a Robust Malware Defense Strategy - Strobes Security, accessed March 13, 2025,
https://strobes.co/blog/why-your-business-needs-a-robust-malware-defense-strategy/
59. Top 5 Most Common Incident Response Scenarios - SBS CyberSecurity, accessed March 13, 2025,
https://sbscyber.com/blog/top-5-most-common-incident-response-scenarios
60. Malware Analysis: The Most Complete Guide - Reflectiz, accessed March 13, 2025,
https://www.reflectiz.com/blog/malware-analysis/
61. Intro to Malware Analysis— SOC Level 1 -Digital Forensics and Incident Response — TryHackMe Walkthrough & Insights - IritT, accessed March 13, 2025,
62. Weak Security Controls and Practices Routinely Exploited for Initial Access - CISA, accessed March 13, 2025,
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-137a
63. How Layering Solutions Helps Create an Offensive Security Strategy - Cobalt.io, accessed March 13, 2025,
https://www.cobalt.io/blog/how-layering-solutions-helps-create-offensive-security-strategy
64. Get Proactive About Security with Malware Emulation | Keysight Blogs, accessed March 13, 2025,
https://www.keysight.com/blogs/en/tech/nwvs/2023/11/new-malware-emulation-threat-simulator
65. How to Stress-Test Your Security Program with Red Teams - ASIS International, accessed March 13, 2025,
https://www.asisonline.org/security...24/12/red-team/stress-test-security-programs/
66. What Are The Different Types Of Penetration Testing? - PurpleSec, accessed March 13, 2025,
https://purplesec.us/learn/types-penetration-testing/
67. What is Adversary Emulation? - Picus Security, accessed March 13, 2025,
https://www.picussecurity.com/resource/glossary/what-is-adversary-emulation
68. Breach & Attack Simulation For Dummies® - Country Language Selection, accessed March 13, 2025,
https://keysight.zinfi.net/concierg.../Breach-and-Attack-Simulation-for-Dummies.pdf
69. Penetration Testing Services for Cyber Security - Mitnick Security Consulting, accessed March 13, 2025,
https://www.mitnicksecurity.com/penetration-testing
70. Malware Simulation: Strengthen Your Cybersecurity Defenses - Rankiteo, accessed March 13, 2025,
https://www.rankiteo.com/services/malware-simulation
71. 10 Hot Breach And Attack Simulation Companies To Watch In 2021 - Cybercrime Magazine, accessed March 13, 2025,
https://cybersecurityventures.com/10-hot-breach-and-attack-simulation-companies-to-watch-in-2021/
72. 19 Top Breach and Attack Simulation (BAS) Tools - eSecurity Planet, accessed March 13, 2025,
https://www.esecurityplanet.com/products/breach-and-attack-simulation-bas-vendors/
73. Top Malware Detection Techniques - Key Methods Explained - AMATAS, accessed March 13, 2025,
https://amatas.com/blog/top-malware-detection-techniques-key-methods-explained/
74. Design and Development of System for Post-infection Attack Behavioral Analysis, accessed March 13, 2025,
https://www.researchgate.net/public...for_Post-infection_Attack_Behavioral_Analysis
75. What is Emotet Malware? Definition, infection chain and protection!, accessed March 13, 2025,
https://www.hornetsecurity.com/en/knowledge-base/emotet/
76. How Sandbox Security Can Boost Your Detection and Malware Analysis Capabilities, accessed March 13, 2025,
https://www.bitdefender.com/en-us/b...r-detection-and-malware-analysis-capabilities
77. Sandboxing Security: A Practical Guide - Perception Point, accessed March 13, 2025,
https://perception-point.io/guides/sandboxing/sandboxing-security-practical-guide/
78. What Is Malware Sandboxing | Analysis & Key Features - Imperva, accessed March 13, 2025,
https://www.imperva.com/learn/application-security/malware-sandboxing/
79. Sandboxes Alone Won't Stop the Malware Onslaught. Here's What Will. - Reversing Labs, accessed March 13, 2025,
https://www.reversinglabs.com/blog/sandboxes-rl-advance-malware-analysis
80. How to Optimize Dynamic Malware Analysis - CodeHunter, accessed March 13, 2025,
https://codehunter.com/news-and-blog/dynamic-analysis-essentials-best-practices-for-malware-analysis
81. How To Set Up Malware Analysis Environment? | by Arunkl | TheSecMaster - Medium, accessed March 13, 2025,
82. Exploring the Infection Chain: ScreenConnect's Link to AsyncRAT Deployment - eSentire, accessed March 13, 2025,
https://www.esentire.com/blog/explo...in-screenconnects-link-to-asyncrat-deployment
83. What are ways I can analyze malware in an infected machine, not just clean it?, accessed March 13, 2025,
https://security.stackexchange.com/...ware-in-an-infected-machine-not-just-clean-it
84. How to create safe environment for malware analysis? : r/cybersecurity - Reddit, accessed March 13, 2025,
85. Virtual Machine for Malware Analysis - GeeksforGeeks, accessed March 13, 2025,
https://www.geeksforgeeks.org/virtual-machine-for-malware-analysis/
86. Tabletop Exercises: Real Life Scenarios and Best Practices - Threat Intelligence, accessed March 13, 2025,
https://www.threatintelligence.com/blog/cyber-tabletop-exercise-example-scenarios
87. 7 Most Common Types of Malware | Cybersecurity - CompTIA, accessed March 13, 2025,
https://www.comptia.org/blog/7-most-common-types-of-malware
88. The Role of Malware Analysis in Cybersecurity - Intezer, accessed March 13, 2025,
https://intezer.com/blog/malware-analysis/the-role-of-malware-analysis-in-cybersecurity/
89. Build AI-powered malware analysis using Amazon Bedrock with Deep Instinct - AWS, accessed March 13, 2025,
https://aws.amazon.com/blogs/machin...ysis-using-amazon-bedrock-with-deep-instinct/
90. Getting Started with Malware Analysis - A Practical Journey - SANS Institute, accessed March 13, 2025,
https://www.sans.org/webcasts/getting-started-with-malware-analysis-practical-journey/
91. Practical Malware Analysis | No Starch Press, accessed March 13, 2025,
https://nostarch.com/malware