DiscoverCyber Security AmericaMemory-Only Malware: The Threat You’re Probably Missing
Memory-Only Malware: The Threat You’re Probably Missing

Memory-Only Malware: The Threat You’re Probably Missing

Update: 2025-07-16
Share

Description

In episode 39, host Josh Nicholson is joined by memory forensics expert Andrew Case, co-developer of the Volatility framework and co-author of The Art of Memory Forensics. Together, they explore the critical role of memory analysis in modern incident response—uncovering hidden malware, insider threats, and ransomware techniques invisible to traditional disk forensics or EDR tools.

Andrew breaks down what’s new in Volatility 3, how memory-only malware operates, and why CISA now recommends memory imaging in its emergency directives. Whether you're a responder, analyst, or just curious about advanced DFIR, this episode is packed with practical insight and real-world experience.

🎧 Stay secure—and subscribe for more expert cyber content.

https://youtu.be/2q4z9Z2_cwc

www.darkstack7.com

 

 

Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Memory-Only Malware: The Threat You’re Probably Missing

Memory-Only Malware: The Threat You’re Probably Missing

Joshua Roy Nicholson