Click here to download all references as Bib-File.
2023-04-27 ⋅ ReversingLabs ⋅ The Week in Security: A possible Colonial Pipeline 2.0, ransomware takes bite out of American eateries |
2022-07-27 ⋅ ReversingLabs ⋅ Threat analysis: Follina exploit fuels 'live-off-the-land' attacks Cobalt Strike MimiKatz |
2022-04-08 ⋅ ReversingLabs ⋅ ConversingLabs Ep. 2: Conti pivots as ransomware as a service struggles Conti Emotet TrickBot |
2021-07-15 ⋅ ReversingLabs ⋅ Data Exfiltrator - A New Tactic for Ransomware Adversaries DataExfiltrator |
2021-03-02 ⋅ ReversingLabs ⋅ Malware in images |
2020-12-16 ⋅ ReversingLabs ⋅ SunBurst: the next level of stealth SolarWinds compromise exploited through sophistication and patience SUNBURST |
2020-12-14 ⋅ Sophos ⋅ Sophos-ReversingLabs (SOREL) 20 Million sample malware dataset |
2020-11-16 ⋅ ReversingLabs ⋅ PoorWeb - Hitching a Ride on Hangul PoorWeb |
2020-09-22 ⋅ ReversingLabs ⋅ Taidoor - a truly persistent threat taidoor |
2020-07-10 ⋅ ReversingLabs ⋅ YARA Rules talks and presentation of REVERSING 2020 |
2020-06-23 ⋅ ReversingLabs ⋅ Hidden Cobra - from a shed skin to the viper’s nest Bankshot PEBBLEDASH TAINTEDSCRIBE |
2020-06-05 ⋅ ReversingLabs ⋅ Retread Ransomware: Identifying Satana to Understand "CoronaVirus" Satana |
2020-01-31 ⋅ ReversingLabs ⋅ RATs in the Library: Remote Access Trojans Hide in Plain "Public" Site CyberGate LimeRAT NjRAT Quasar RAT Revenge RAT |
2020-01-24 ⋅ ReversingLabs ⋅ Hunting for Ransomware Ryuk |
2019-09-10 ⋅ ReversingLabs ⋅ Mirai Botnet Continues to Plague IoT Space Mirai |
2019-03-27 ⋅ ReversingLabs ⋅ Forging the ShadowHammer shadowhammer |
2017-10-26 ⋅ Reversing Labs ⋅ ReversingLabs' YARA rule detects BadRabbit encryption routine specifics EternalPetya |