Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-08SymantecThreat Hunter Team
Daxin Backdoor: In-Depth Analysis, Part One
Daxin
2022-03-08Twitter (@ShaneHuntley)Google Threat Analysis Group, Shane Huntley
Tweet on APT31 phishing campaign targeting high profile Gmail users affiliated with the U.S. government in February
2022-03-07GoogleGoogle Threat Analysis Group, Shane Huntley
An update on the threat landscape (APT28, UNC1151, MUSTANG PANDA)
2022-03-05University of ZaragozaMiguel Martín Pérez
Effectiveness of Similarity Digest Algorithms for Binary Code Similarity in Memory Forensic Analysis
2022-03-04vmwareGiovanni Vigna, Oleg Boyarchuk, Stefano Ortolani, Threat Analysis Unit
Hermetic Malware: Multi-component Threat Targeting Ukraine Organizations
HermeticWiper
2022-03-04MalwarebytesMalwarebytes Threat Intelligence
HermeticWiper: A detailed analysis of the destructive malware that targeted Ukraine
HermeticWiper
2022-03-04Github (eln0ty)Abdallah Elnoty
HermeticWiper/FoxBlade Analysis (in-depth)
HermeticWiper
2022-03-03CloudsekAnandeshwar Unnikrishnan, Deepanjli Paulraj
Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine
HermeticWiper
2022-03-03Medium s2wlabJiho Kim
Deep Analysis of Redline Stealer: Leaked Credential with WCF
RedLine Stealer
2022-03-02LexfoLexfo
AvosLocker Ransomware Linux Version Analysis
Avoslocker
2022-03-02Youtube (OALabs)Sean Wilson, Sergei Frankoff
Botleggers Exposed - Analysis of The Conti Leaks Malware
Conti
2022-03-01Arctic WolfArctic Wolf
Conti Ransomware: An Analysis of Key Findings
Conti
2022-03-01DeepInstinctIdo Kringel
What is HermeticWiper – An Analysis of the Malware and Larger Threat Landscape in the Russian Ukrainian War
HermeticWiper
2022-03-01Nozomi NetworksNozomi Networks Labs
How IoT Botnets Evade Detection and Analysis
Mozi SBIDIOT
2022-03-01Github (0xZuk0)Dipankar Lama
Malware Analysis Report: WannaCry Ransomware
WannaCryptor
2022-03-01GoogleGoogle Threat Analysis Group, Shane Huntley
TAG Bulletin: Q1 2022
2022-02-28MicrosoftMSRC Team
Cyber threat activity in Ukraine: analysis and resources
CaddyWiper DesertBlade DoubleZero HermeticWiper INDUSTROYER2 IsaacWiper PartyTicket WhisperGate DEV-0586
2022-02-28NCSC UKNCSC UK
Malware Analysis Report: SparrowDoor
SparrowDoor GhostEmperor
2022-02-28TrellixTaylor Mullins
Trellix Global Defenders: Analysis and Protections for RagnarLocker Ransomware
RagnarLocker RagnarLocker
2022-02-28TrellixTaylor Mullins
Trellix Global Defenders: Analysis and Protections for BlackByte Ransomware
BlackByte