Click here to download all references as Bib-File.•
2018-12-14
⋅
Australian Cyber Security Centre
⋅
Investigationreport: Compromise of an Australian companyvia their Managed Service Provider PlugX RedLeaves |
2018-12-14
⋅
Trend Micro
⋅
Cybercriminals Use Malicious Memes that Communicate with Malware Berbomthum |
2018-12-05
⋅
Botconf
⋅
FORMBOOK In-depth malware analysis Formbook |
2018-10-01
⋅
ThreatFabric
⋅
BianLian - from rags to riches, the malware dropper that had a dream BianLian |
2018-09-18
⋅
Cybereason
⋅
VAI MALANDRA: A LOOK INTO THE LIFECYCLE OF BRAZILIAN FINANCIAL MALWARE: PART ONE Overlay RAT |
2018-09-04
⋅
SecurityIntelligence
⋅
CamuBot: New Financial Malware Targets Brazilian Banking Customers CamuBot |
2018-08-22
⋅
Cisco Talos
⋅
Picking Apart Remcos Botnet-In-A-Box Remcos |
2018-08-20
⋅
ReversingMinds' Blog
⋅
Advanced Brazilian Malware Analysis N40 |
2018-07-26
⋅
IEEE Symposium on Security and Privacy (SP)
⋅
Tracking Ransomware End-to-end Cerber Locky WannaCryptor |
2018-07-11
⋅
F5
⋅
Tackling Gootkit's Traps |
2018-06-26
⋅
Cisco Talos
⋅
Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor Thanatos Ransomware |
2018-06-06
⋅
Cisco Talos
⋅
VPNFilter Update - VPNFilter exploits endpoints, targets new devices VPNFilter |
2018-05-15
⋅
BSides Detroit
⋅
IR in Heterogeneous Environment Korlia Poison Ivy |
2018-04-24
⋅
FireEye
⋅
Metamorfo Campaigns Targeting Brazilian Users Metamorfo |
2018-04-12
⋅
Kaspersky Labs
⋅
Operation Parliament, who is doing what? Operation Parliament |
2018-03-30
⋅
Trend Micro
⋅
Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types Project Alice ATMitch Ploutus ATM Ripper ATM Skimer SUCEFUL Tyupkin |
2018-03-29
⋅
Stormshield
⋅
In-depth Formbook malware analysis – Obfuscation and process injection Formbook |
2018-03-09
⋅
Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads? StrongPity |
2018-03-09
⋅
Kaspersky Labs
⋅
Cloning chip-and-PIN cards: Brazilian job Prilex |
2018-01-12
⋅
Stormshield
⋅
Analyzing an Agent Tesla campaign: from a word document to the attacker credentials Agent Tesla |