Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-09-24Kaspersky LabsKaspersky Lab ICS CERT
Threat landscape for industrial automation systems - H1 2020
Poet RAT Mailto Milum RagnarLocker REvil Ryuk Snake
2020-09-18AppGateFelipe Duarte, Gustavo Palazolo
Reverse Engineering Dridex and Automating IOC Extraction
Dridex
2020-09-18AppGateFelipe Duarte, Gustavo Palazolo
Reverse Engineering Dridex and Automating IOC Extraction
Dridex
2020-09-17Max Kersten's BlogMax Kersten
Automatic ReZer0 payload and configuration extraction
2020-09-10QuoSec GmbHQuosec Blog
grap: Automating QakBot strings decryption
QakBot
2020-09-10MicrosoftTom Burt
New cyberattacks targeting U.S. elections
2020-09-08Trend MicroAugusto Remillano II
Exposed Docker Server Abused to Drop Cryptominer, DDoS Bot
Kaiten
2020-09-08Lopqto's AdventuresHamidreza Babaee
Automated dynamic import resolving using binary emulation
Mailto
2020-09-03CybereasonTom Fakterman
No Rest for the Wicked: Evilnum Unleashes PyVil RAT
PyVil
2020-08-31JPCERT/CCShusei Tomonaga
Malware Used by Lazarus after Network Intrusion
Lazarus Group
2020-08-31JPCERT/CCShusei Tomonaga
Malware used by the attack group Lazarus after network intrusion
2020-08-20Zero2Automated BlogDaniel Bunce
DBatLoader/ModiLoader Analysis – First Stage
DBatLoader
2020-08-17AquaYaniv Agman
Uncover Malware Payload Executions Automatically with Tracee
2020-07-24Medium tom_rockThomas Roccia
Fifty Shades of Malware Strings
2020-07-13FireEyeAaron Stephens, Andrew Thompson
SCANdalous! (External Detection Using Network Scan Data and Automation)
POWERTON QUADAGENT PoshC2
2020-07-13FireEyeAaron Stephens, Andrew Thompson
SCANdalous! (External Detection Using Network Scan Data and Automation)
POWERTON QUADAGENT PoshC2
2020-07-10MalwarebytesPieter Arntz
Threat spotlight: WastedLocker, customized ransomware
WastedLocker
2020-07-10ReversingLabsChristiaan Beek, Cooper Quintin, Hilko Bengen, Jo Johnson, Tom Ueltschi, Tomislav Pericin, Vitali Kremez, Wyatt Roersma
YARA Rules talks and presentation of REVERSING 2020
2020-07-10ReversingLabsChristiaan Beek, Cooper Quintin, Hilko Bengen, Jo Johnson, Tom Ueltschi, Tomislav Pericin, Vitali Kremez, Wyatt Roersma
YARA Rules talks and presentation of REVERSING 2020
2020-07-07Sentinel LABSJason Reaves
Breaking EvilQuest | Reversing A Custom macOS Ransomware File Encryption Routine
EvilQuest