Click here to download all references as Bib-File.•
| 2019-06-03
⋅
Kindred Security
⋅
Code Analysis of Basic Cryptomining Malware RaspberryPiBotnet |
| 2019-06-02
⋅
VMRay
⋅
Hypervisor-based Analysis of macOS Malware Coldroot RAT |
| 2019-06-01
⋅
⋅
Weixin
⋅
Antiy releases analysis report of "Formula Organization" attack on Middle East SWIFT service providers |
| 2019-05-22
⋅
TRICKBOT - Analysis TrickBot |
| 2019-05-10
⋅
SophosLabs Uncut
⋅
MegaCortex, deconstructed: mysteries mount as analysis continues MegaCortex |
| 2019-05-09
⋅
Intezer
⋅
Technical Analysis: Pacha Group Competing against Rocke Group for Cryptocurrency Mining Foothold on the Cloud GreedyAntd Pacha Group Rocke |
| 2019-05-09
⋅
CISA
⋅
Malware Analysis Report (AR19-129A) ELECTRICFISH Lazarus Group |
| 2019-04-30
⋅
Forcepoint
⋅
TinyPOS: An analysis of a Point-Of-Sale malware ecosystem |
| 2019-04-30
⋅
ClearSky
⋅
Raw Threat Intelligence 2019-04-30: Oilrig data dump link analysis SpyNote OopsIE |
| 2019-04-23
⋅
FireEye
⋅
CARBANAK Week Part Two: Continuing the CARBANAK Source Code Analysis |
| 2019-04-12
⋅
BroadAnalysis
⋅
Rig Exploit Kit delivers Bunitu Malware Bunitu |
| 2019-04-12
⋅
Stratosphere Lab
⋅
Analysis of an IRC based Botnet Mirai |
| 2019-04-10
⋅
Microsoft
⋅
Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability |
| 2019-04-10
⋅
US-CERT
⋅
Malware Analysis Report (AR19-100A): North Korean Trojan: HOPLIGHT HOPLIGHT |
| 2019-04-07
⋅
Eybisi
⋅
Mobile Malware Analysis : Tricks used in Anubis Anubis |
| 2019-04-07
⋅
Emotet malware analysis. Part 2 Emotet |
| 2019-03-28
⋅
F-Secure
⋅
Analysis of ShadowHammer ASUS Attack First Stage Payload shadowhammer |
| 2019-03-27
⋅
mauronz blog
⋅
Analysis of the ShadowHammer backdoor shadowhammer |
| 2019-03-22
⋅
AhnLab
⋅
ASEC REPORT VOL.93 Q4 2018 Korlia |
| 2019-03-21
⋅
⋅
Qianxin
⋅
Analysis of the latest attack activities of the suspected MuddyWater APT group against the Iraqi mobile operator Korek Telecom POWERSTATS |