Click here to download all references as Bib-File.•
| 2022-05-10
⋅
Marco Ramilli's Blog
⋅
A Malware Analysis in RU-AU conflict Cobalt Strike |
| 2022-05-10
⋅
Github (SrujanKumar-K)
⋅
Malicious PDF Document Analysis - Lazyscripter Lazyscripter |
| 2022-05-09
⋅
⋅
360 netlab
⋅
The data analysis behind the cyber attack on Beijing Healthbao |
| 2022-05-07
⋅
YouTube (botconf eu)
⋅
Operation Gamblingpuppet: Analysis Of A Multiplatform Campaign Targeting Online Gambling Customers Earth Berberoka |
| 2022-05-06
⋅
CrowdStrike
⋅
macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis Lador |
| 2022-05-06
⋅
CrowdStrike
⋅
macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis EvilQuest FlashBack Shlayer XCSSET |
| 2022-05-06
⋅
Palo Alto Networks Unit 42
⋅
Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding Cobalt Strike |
| 2022-05-05
⋅
Github (muha2xmad)
⋅
Analysis of MS Word to drop Remcos RAT | VBA extraction and analysis | IoCs Remcos |
| 2022-05-05
⋅
YouTube (Chris Greer)
⋅
MALWARE Analysis with Wireshark // TRICKBOT Infection TrickBot |
| 2022-05-04
⋅
Twitter (@ESETresearch)
⋅
Twitter thread on code similarity analysis, focussing on IsaacWiper and recent Cluster25 publication IsaacWiper |
| 2022-05-03
⋅
Google
⋅
Update on cyber activity in Eastern Europe Curious Gorge |
| 2022-05-03
⋅
Zscaler
⋅
Analysis of BlackByte Ransomware's Go-Based Variants BlackByte |
| 2022-05-02
⋅
AT&T
⋅
Analysis on recent wiper attacks: examples and how wiper malware works AcidRain CaddyWiper DoubleZero HermeticWiper INDUSTROYER2 IsaacWiper |
| 2022-05-01
⋅
YouTube (Uriel Kosayev)
⋅
Yashma Ransomware Builder Analysis - Malware Analysis Chaos |
| 2022-04-29
⋅
Cluster25
⋅
The LOTUS PANDA Is Awake, Again. Analysis Of Its Last Strike. APT30 Naikon |
| 2022-04-27
⋅
eSentire
⋅
eSentire Threat Intelligence Malware Analysis: SolarMarker solarmarker |
| 2022-04-26
⋅
AhnLab
⋅
New Malware of Lazarus Threat Actor Group Exploiting INITECH Process Racket Downloader wAgentTea |
| 2022-04-25
⋅
Cybereason
⋅
THREAT ANALYSIS REPORT: SocGholish and Zloader – From Fake Updates and Installers to Owning Your Systems FAKEUPDATES Zloader |
| 2022-04-25
⋅
Netresec
⋅
Industroyer2 IEC-104 Analysis INDUSTROYER2 |
| 2022-04-25
⋅
paloalto Networks Unit 42
⋅
Defeating BazarLoader Anti-Analysis Techniques BazarBackdoor |