VMRay
Academy

The VMRay Academy of Malware and Phishing Analysis offers an opportunity of self-learning for SOC teams and cybersecurity enthusiasts.

Introducing the Academy

Welcome to the VMRay Academy of Malware and Phishing Analysis—a platform tailored for SOC teams, security analysts, and enthusiasts.

Explore insightful courses covering essential topics like alert handling, security automation, deep threat analysis, effective and timely incident response, proactive defense, and threat intelligence generation. The courses are built on not only our expertise in the field as pioneers of advanced malware and phishing analysis, but also what we have learnt from our community: our customers, admirers, and professionals from some of the most demanding security teams in the world.

Equip yourself with practical skills to thrive in cybersecurity’s dynamic landscape. From managing alerts to getting deeper into the threats and building threat intelligence, our engaging content provides actionable insights. 

A security analyst learning how to analyze challenging malware and phishing threats with VMRay.

Advanced analysis for
malware and phishing

Building the foundation stone

Step into the world of advanced malware and phishing analysis with us. Explore how these solutions go beyond the technical realm, offering a plethora of insights to SOC teams. Uncover valuable perspectives and gain a deeper understanding of the pivotal role advanced analysis plays in today's cybersecurity landscape.

Let's dive in to discover the essentials of bolstering your security stance.

Course 1: 
How advanced sandboxing can solve SOC challenges

15 minutes

13 minutes – 3 videos

Managing the alerts:
From alert triage to alert enrichment

Navigating the sea of alerts

Let’s explore how to unravel the art of alert management. From triage to enrichment, we discuss how to navigate the intricate world of security automation. You can discover how you can find the best approach to security automation. We’ll discuss how effective alert triage and enrichment can help filter out the noise, tame alert fatigue and empower SOC teams for more impactful tasks that help them grow.

Join us as we delve into the realm of malware and phishing analysis and its impact on automating security tasks.

45 minutes – 15 videos

Course 2: 
Bringing context & efficiency to automate phishing analysis

13 minutes – 3 videos

Course 3: 
Security Automation: What you need to know to start

13 minutes – 3 videos

25 minutes – 5 videos

Deeper threat analysis.
Faster incident response.

On time. In-depth.

Now that we've filtered out the noise and created room to focus on the real threats among the sea of alerts, it's time to venture further into these threats. In this track, we embark on a journey to explore the realm of deeper threat analysis and faster incident response. From understanding the nuances of incident response and threat hunting to building a proactive defense through detection engineering, we share insights that empower you to tackle threats head-on.

Join us as we explore the intricacies of advanced threat analysis and uncover how it fuels a more effective and proactive cybersecurity strategy.

Building a proactive defense through reliable Threat Intelligence

From analysis to action: Unleashing the insights.

With the noise effectively filtered and the real threats meticulously analyzed, the groundwork is laid. Now, it's time to harness the power of clear, actionable insights gained from deep analyses. In this track, we explore how to construct a robust threat intelligence program that aligns with your unique challenges. From understanding the limitations of second-party threat intel to leveraging the insights you generate, join us as we equip you with the tools to anticipate, respond, and defend against future threats.

Get ready to build a proactive defense strategy that's informed, effective, and tailored to your organization's security needs.

15 minutes

Course 2:
IOCs vs Artifacts: How to filter out the noise

35 minutes

See VMRay in action.
Start maximizing the value of your
Incident Response & Detection Engineering.

Welcome to the playground.

Explore what you can do with VMRay.

Click on the yellow dots to check the report formats, see the overview, explore the network connections of the sample, malicious behavior, and relevant files, map the threat on MITRE ATT&CK Framework, analyze and download IOCs and artifacts.

The analysis report tabs are available both for VMRayDeepResponse and VMRayTotalInsight. The bundle of VMRay FinalVerdict and VMRayDeepResponse also offers access to the analysis report tabs.

We’re sorry. 

The interactive tour is not available on mobile devices.

Unveiling the power:
See our experts showcasing VMRay’s capabilities.

Analysis of a malicious file

Join Fatih Akar from the VMRay team as he provides a detailed walkthrough of a malicious LNK file, a prevalent attack vector since Microsoft’s Office macros block.

Gain valuable insights into each tab of our comprehensive analysis report and get a sneak peek into what you’ll be exploring.

Analysis of a malicious URL

Join Andrey Voitenko, an expert in advanced malware and phishing analysis from the VMRay team, as he demonstrates how to submit emails and URLs to the VMRay platform using built-in connectors.

Discover the capabilities of our new Automation Dashboard, enabling one-click automation with your existing EDR, SOAR, SIEM, and TIP tools. Monitor analysis data seamlessly from your VMRay dashboard and unlock new levels of efficiency in your security operations.

Integrating with existing tools

Watch Michael Bourton showcasing the seamless integration of VMRay platform with your existing security stacks.

Discover how effortlessly you can leverage unparalleled detection and analysis capabilities by utilizing dedicated connectors or our Rest API.

Experience VMRay in Action:
Explore Real-world Malware Analysis Reports

Get a firsthand look at the power and capabilities of the VMRay platform by delving into our sample malware and phishing analysis reports.

Immerse yourself in a range of report formats, providing comprehensive insights.

Dive into the overview, explore intricate network connections, analyze malicious behavior in detail, and map threats using the MITRE ATT&CK Framework. See the possibilities to download clear IOCs.

Uncover the capabilities that await you.

Calculate how much malware false positives are costing your organization:
Malware False Positive Cost Calculator