JSAC2026: Essential Workshops on Email Security and Malware Analysis
Basically, experts are sharing hands-on techniques to analyze malicious emails and malware at a cybersecurity event.
At JSAC2026, cybersecurity experts shared valuable techniques for analyzing malicious emails and malware. Participants learned hands-on skills to better protect themselves and their organizations. These workshops highlight the importance of staying informed in an ever-evolving cyber threat landscape.
What Happened
At JSAC2026, cybersecurity professionals gathered to enhance their skills through various workshops. These sessions focused on analyzing malicious emails and reverse engineering malware, providing practical insights for incident response. The workshops featured expert speakers who shared their knowledge and tools to tackle real-world threats.
The first workshop, led by Manabu Niseki and Michał Praszmo, centered on using the EML Analyzer? to triage malicious emails. They began by explaining email architecture and attack techniques, emphasizing the importance of understanding email headers. Participants learned about authentication technologies like SPF?, DKIM?, and DMARC?, which help verify the legitimacy of emails. In the second half, attendees engaged in hands-on analysis using the EML Analyzer?, an open-source tool that helps visualize email data.
The second workshop, conducted by Mark Lim from Palo Alto Networks, focused on advanced malware reverse engineering?. Participants examined two malware families, specifically Guloader and Gremlin, in a multi-stage attack scenario. Lim guided them through the analysis of VBS files, PowerShell scripts, and shellcode, while also addressing anti-analysis techniques?. This step-by-step approach reinforced both conceptual understanding and practical skills.
Lastly, Akihiro Yoshitake and his colleagues introduced a workshop on analyzing .NET AOT malware. They explained the challenges of working with binaries that lack IL code and metadata, which are common in traditional .NET malware. Through hands-on exercises with tools like Ghidra? and IDA Pro?, participants learned to identify functions and improve code readability, ultimately enhancing their analysis capabilities.
Why Should You Care
Understanding how to analyze malicious emails and malware is crucial for anyone who uses technology today. If you rely on email for communication or use software on your devices, you could be a target for cyber threats. Learning these skills can help protect your personal information and your company's data.
Think of it like learning to recognize a phishing email or a suspicious software download. Just as you wouldn’t open a door to a stranger, you shouldn’t click on unknown links or attachments. By attending these workshops, participants are better equipped to defend themselves and their organizations against cyber attacks.
What's Being Done
The JSAC2026 workshops are part of a broader effort to enhance cybersecurity skills among professionals. Experts are actively sharing knowledge and tools to combat evolving threats. Here’s what participants and organizations can do right now:
- Engage in hands-on training sessions to improve skills.
- Utilize tools like EML Analyzer?, Ghidra?, and IDA Pro? for practical analysis.
- Stay updated on the latest malware trends and techniques.
Experts are watching for advancements in malware techniques and the effectiveness of new analysis tools as they emerge.
JPCERT/CC