Click here to download all references as Bib-File.•
2022-05-16
⋅
vmware
⋅
Emotet Moves to 64 bit and Updates its Loader Emotet |
2022-05-16
⋅
JPCERT/CC
⋅
Analysis of HUI Loader HUI Loader PlugX Poison Ivy Quasar RAT |
2022-05-12
⋅
Cloudsek
⋅
Technical Analysis of Emerging, Sophisticated Pandora Ransomware Group Pandora |
2022-05-12
⋅
Red Canary
⋅
Gootloader and Cobalt Strike malware analysis GootLoader Cobalt Strike |
2022-05-11
⋅
NTT Security Holdings
⋅
Analysis of an Iranian APTs “E400” PowGoop Variant Reveals Dozens of Control Servers Dating Back to 2020 PowGoop |
2022-05-11
⋅
Sandfly Security
⋅
BPFDoor - An Evasive Linux Backdoor Technical Analysis BPFDoor |
2022-05-10
⋅
Marco Ramilli's Blog
⋅
A Malware Analysis in RU-AU conflict Cobalt Strike |
2022-05-10
⋅
Github (SrujanKumar-K)
⋅
Malicious PDF Document Analysis - Lazyscripter Lazyscripter |
2022-05-09
⋅
⋅
360 netlab
⋅
The data analysis behind the cyber attack on Beijing Healthbao |
2022-05-07
⋅
YouTube (botconf eu)
⋅
Operation Gamblingpuppet: Analysis Of A Multiplatform Campaign Targeting Online Gambling Customers Earth Berberoka |
2022-05-06
⋅
CrowdStrike
⋅
macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis Lador |
2022-05-06
⋅
CrowdStrike
⋅
macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis EvilQuest FlashBack Shlayer XCSSET |
2022-05-06
⋅
Palo Alto Networks Unit 42
⋅
Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding Cobalt Strike |
2022-05-05
⋅
Github (muha2xmad)
⋅
Analysis of MS Word to drop Remcos RAT | VBA extraction and analysis | IoCs Remcos |
2022-05-05
⋅
YouTube (Chris Greer)
⋅
MALWARE Analysis with Wireshark // TRICKBOT Infection TrickBot |
2022-05-04
⋅
Twitter (@ESETresearch)
⋅
Twitter thread on code similarity analysis, focussing on IsaacWiper and recent Cluster25 publication IsaacWiper |
2022-05-03
⋅
Google
⋅
Update on cyber activity in Eastern Europe Curious Gorge |
2022-05-03
⋅
Zscaler
⋅
Analysis of BlackByte Ransomware's Go-Based Variants BlackByte |
2022-05-02
⋅
AT&T
⋅
Analysis on recent wiper attacks: examples and how wiper malware works AcidRain CaddyWiper DoubleZero HermeticWiper INDUSTROYER2 IsaacWiper |
2022-04-29
⋅
Cluster25
⋅
The LOTUS PANDA Is Awake, Again. Analysis Of Its Last Strike. APT30 Naikon |