Click here to download all references as Bib-File.•
2020-12-02
⋅
⋅
AhnLab
⋅
CLOP Ransomware Report Clop |
2020-11-24
⋅
Trend Micro
⋅
Analysis of Kinsing Malware's Use of Rootkit Kinsing Kinsing |
2020-11-23
⋅
Medium ryancor
⋅
Genetic Analysis of CryptoWall Ransomware Cryptowall |
2020-11-23
⋅
S2W LAB Inc.
⋅
[S2W LAB] Analysis of Clop Ransomware suspiciously related to the Recent Incident Clop |
2020-11-20
⋅
F-Secure Labs
⋅
Detecting Cobalt Strike Default Modules via Named Pipe Analysis Cobalt Strike |
2020-11-18
⋅
VMRay
⋅
Malware Analysis Spotlight: AZORult Delivered by GuLoader Azorult CloudEyE |
2020-11-17
⋅
Google
⋅
TAG Bulletin: Q4 2020 |
2020-11-15
⋅
PRODAFT Threat Intelligence
⋅
BRUNHILDA - DaaS Malware Analysis Report Alien Brunhilda |
2020-11-12
⋅
circleid
⋅
An Investigative Analysis of the Silent Librarian IoCs |
2020-11-09
⋅
⋅
360
⋅
Analysis of the latest targeted attacks by Lugansk against Ukraine |
2020-11-06
⋅
Telsy
⋅
Malware Analysis Report: Trying not to walk in the dark woods. A way out of the Maze Maze |
2020-11-05
⋅
SUCURI
⋅
ALFA TEaM Shell ~ v4.1-Tesla: A Feature Update Analysis |
2020-10-29
⋅
US-CERT
⋅
Malware Analysis Report (AR20-303B): ZEBROCY Backdoor Zebrocy |
2020-10-29
⋅
US-CERT
⋅
Malware Analysis Report (AR20-303A): PowerShell Script: ComRAT Agent.BTZ |
2020-10-26
⋅
⋅
Qianxin
⋅
Analysis of the attack activities of the Rattlesnake organization using the Buffy bilateral agreement as bait SideWinder |
2020-10-18
⋅
Youtube (L!NK)
⋅
Malware Analysis: Stealer - XOR, CyberChef, x64Dbg Scripting (Part 2) Raccoon |
2020-10-16
⋅
Google
⋅
How we're tackling evolving online threats |
2020-10-13
⋅
Fortinet
⋅
Deep Analysis – The EKING Variant of Phobos Ransomware Phobos |
2020-10-05
⋅
Zawadi Done
⋅
DarkSide ransomware analysis DarkSide |
2020-10-03
⋅
Youtube (L!NK)
⋅
Malware Analysis: Stealer - Mutex Check, Stackstrings, IDA (Part 1) Raccoon |