Click here to download all references as Bib-File.•
2020-07-01
⋅
Flashpoint
⋅
Zeppelin Ransomware Analysis |
2020-06-27
⋅
kienmanowar Blog
⋅
Quick analysis note about GuLoader (or CloudEyE) CloudEyE |
2020-06-22
⋅
Team Cymru
⋅
Quick Wins with Network Flow Analysis |
2020-06-22
⋅
m.alvar.es
⋅
Comparative analysis between Bindiff and Diaphora - Patched Smokeloader Study Case SmokeLoader |
2020-06-22
⋅
njRat Malware Analysis NjRAT |
2020-06-21
⋅
N1ght-W0lf Blog
⋅
Deep Analysis of SmokeLoader SmokeLoader |
2020-06-20
⋅
Cyber And Ramen blog
⋅
Analysis of LODEINFO Maldoc LODEINFO |
2020-06-17
⋅
SentinelOne
⋅
A Click from the Backyard | Analysis of CVE-2020-9332, a Vulnerable USB Redirection Software |
2020-06-16
⋅
Intezer
⋅
ELF Malware Analysis 101: Linux Threats No Longer an Afterthought Cloud Snooper Dacls EvilGnome HiddenWasp MESSAGETAP NOTROBIN QNAPCrypt Winnti |
2020-06-15
⋅
VMWare Carbon Black
⋅
TAU Threat Analysis: Relations to Hakbit Ransomware Hakbit |
2020-06-10
⋅
CrowdStrike
⋅
CSIT-20081 : Technical Analysis Of The Netwalker Ransomware Mailto CIRCUS SPIDER |
2020-06-10
⋅
Proofpoint
⋅
FlowCloud Version 4.1.3 Malware Analysis FlowCloud |
2020-06-08
⋅
VMWare Carbon Black
⋅
TAU Threat Analysis: Hakbit Ransomware Hakbit |
2020-06-08
⋅
Security Soup Blog
⋅
Analysis of Valak Maldoc Valak |
2020-06-05
⋅
Google
⋅
Exploits of a TAG analyst chasing in the wild (slides) |
2020-06-05
⋅
⋅
Google
⋅
Exploits of a TAG analyst chasing in the wild (video) |
2020-06-02
⋅
Fox-IT
⋅
In-depth analysis of the new Team9 malware family BazarBackdoor |
2020-06-02
⋅
NCC Group
⋅
In-depth analysis of the new Team9 malware family BazarBackdoor |
2020-06-01
⋅
Seguranca Informatica
⋅
In-depth analysis of a trojan banker impacting Portugal and Brazil |
2020-05-30
⋅
Youtube (OALabs)
⋅
IRC Botnet Reverse Engineering Part 1 - Preparing Binary for Analysis in IDA PRO Hamweq |