Click here to download all references as Bib-File.•
2019-04-07
⋅
Emotet malware analysis. Part 2 Emotet |
2019-03-28
⋅
F-Secure
⋅
Analysis of ShadowHammer ASUS Attack First Stage Payload shadowhammer |
2019-03-27
⋅
mauronz blog
⋅
Analysis of the ShadowHammer backdoor shadowhammer |
2019-03-22
⋅
AhnLab
⋅
ASEC REPORT VOL.93 Q4 2018 Korlia |
2019-03-21
⋅
⋅
Qianxin
⋅
Analysis of the latest attack activities of the suspected MuddyWater APT group against the Iraqi mobile operator Korek Telecom POWERSTATS |
2019-03-19
⋅
NSHC
⋅
SectorM04 Targeting Singapore – An Analysis PlugX Termite |
2019-03-18
⋅
PepperMalware Blog
⋅
Analysis of .Net Stealer GrandSteal GrandSteal |
2019-03-18
⋅
Analysis of BlackMoon (Banking Trojan)'s Evolution, And The Possibility of a Latest Version Under Development KrBanker |
2019-03-17
⋅
Persianov on Security
⋅
Emotet malware analysis. Part 1 Emotet |
2019-03-14
⋅
DCSO
⋅
Pegasus/Buhtrap analysis of the malware stage based on the leaked source code Buhtrap |
2019-03-13
⋅
Security Art Work
⋅
ORANGEWORM GROUP – KWAMPIRS ANALYSIS UPDATE Kwampirs |
2019-03-11
⋅
Infor Stealer Vidar TrojanSpy Analysis... Vidar |
2019-03-05
⋅
PepperMalware Blog
⋅
Quick Analysis of a Trickbot Sample with NSA's Ghidra SRE Framework TrickBot |
2019-02-28
⋅
Intezer
⋅
Technical Analysis: Pacha Group Deploying Undetected Cryptojacking Campaigns on Linux Servers Pacha Group |
2019-02-28
⋅
⋅
Weixin
⋅
URLZone: Analysis of Suspected Attacks Against Japanese Hi-Tech Enterprise Employees UrlZone |
2019-02-24
⋅
NDSS
⋅
Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet Hajime |
2019-02-23
⋅
RE Solver
⋅
D-Link DNS-320 NAS Cr1ptT0r Ransomware ARM Dynamic Analysis - QEMU and Raspberry PI VM Cr1ptT0r |
2019-02-06
⋅
Analysis of multiplatform Java Jacksbot Backdoor |
2019-02-01
⋅
Github (Zenexer)
⋅
LNKR - Extension analysis - Flash Playlist LNKR |
2019-01-30
⋅
Analysis of NetWiredRC trojan NetWire RC |