Click here to download all references as Bib-File.•
2019-04-23
⋅
FireEye
⋅
CARBANAK Week Part Two: Continuing the CARBANAK Source Code Analysis |
2019-04-12
⋅
BroadAnalysis
⋅
Rig Exploit Kit delivers Bunitu Malware Bunitu |
2019-04-12
⋅
Stratosphere Lab
⋅
Analysis of an IRC based Botnet Mirai |
2019-04-10
⋅
Microsoft
⋅
Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability |
2019-04-10
⋅
US-CERT
⋅
Malware Analysis Report (AR19-100A): North Korean Trojan: HOPLIGHT HOPLIGHT |
2019-04-07
⋅
Eybisi
⋅
Mobile Malware Analysis : Tricks used in Anubis Anubis |
2019-04-07
⋅
Emotet malware analysis. Part 2 Emotet |
2019-03-28
⋅
F-Secure
⋅
Analysis of ShadowHammer ASUS Attack First Stage Payload shadowhammer |
2019-03-27
⋅
mauronz blog
⋅
Analysis of the ShadowHammer backdoor shadowhammer |
2019-03-22
⋅
AhnLab
⋅
ASEC REPORT VOL.93 Q4 2018 Korlia |
2019-03-21
⋅
⋅
Qianxin
⋅
Analysis of the latest attack activities of the suspected MuddyWater APT group against the Iraqi mobile operator Korek Telecom POWERSTATS |
2019-03-19
⋅
NSHC
⋅
SectorM04 Targeting Singapore – An Analysis PlugX Termite |
2019-03-18
⋅
PepperMalware Blog
⋅
Analysis of .Net Stealer GrandSteal GrandSteal |
2019-03-18
⋅
Analysis of BlackMoon (Banking Trojan)'s Evolution, And The Possibility of a Latest Version Under Development KrBanker |
2019-03-17
⋅
Persianov on Security
⋅
Emotet malware analysis. Part 1 Emotet |
2019-03-14
⋅
DCSO
⋅
Pegasus/Buhtrap analysis of the malware stage based on the leaked source code Buhtrap |
2019-03-13
⋅
Security Art Work
⋅
ORANGEWORM GROUP – KWAMPIRS ANALYSIS UPDATE Kwampirs |
2019-03-11
⋅
Infor Stealer Vidar TrojanSpy Analysis... Vidar |
2019-03-05
⋅
PepperMalware Blog
⋅
Quick Analysis of a Trickbot Sample with NSA's Ghidra SRE Framework TrickBot |
2019-02-28
⋅
Intezer
⋅
Technical Analysis: Pacha Group Deploying Undetected Cryptojacking Campaigns on Linux Servers Pacha Group |