Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-12-30Telegra.ph blogims0rry
Analysis DarkSky Botnet
Darksky
2017-12-22Malware Traffic AnalysisBrad Duncan
MALSPAM USES CVE-2017-0199 TO DISTRIBUTE REMCOS RAT
Remcos
2017-12-20RiskIQYonathan Klijnsma
Mining Insights: Infrastructure Analysis of Lazarus Group Cyber Attacks on the Cryptocurrency Industry
PowerRatankba
2017-12-19TrustwaveSimon Kenin
BrickerBot mod_plaintext Analysis
BrickerBot
2017-12-18NCCICNCCIC
Malware Analysis Report on Hatman
Triton
2017-12-15GradiantDavid Alvarez-Perez
In depth analysis of malware exploiting CVE-2017-11826
x4
2017-12-13US-CERTUS-CERT
Malware Analysis Report (MAR) - 10135536-B
BADCALL Bankshot
2017-12-13DragosDragos
TRISIS Malware: Analysis of Safety System Targeted Malware
Triton
2017-12-09BlueHat Security ConferenceBilly Leonard, Google Threat Analysis Group
10 Years of Targeted Credential Phishing
2017-12-03Karsten Hahn
Malware Analysis - ROKRAT Unpacking from Injected Shellcode
2017-11-23Malware Traffic AnalysisBrad Duncan
NECURS BOTNET MALSPAM PUSHES "SCARAB" RANSOMWARE
Scarab Ransomware
2017-11-21bugarooOscar Juárez
New banking malware in Brazil - XPCTRA RAT ANALYSIS
XPCTRA
2017-11-15Trend MicroRubio Wu
New EMOTET Hijacks a Windows API, Evades Sandbox and Analysis
Emotet
2017-11-10CrowdStrikeKaran Sood
CCleaner Stage 2: In-Depth Analysis of the Payload
CCleaner Backdoor
2017-11-08FreebufSecurity Leopard
Analysis of an active USB flash drive virus
MyloBot
2017-11-05Vitali Kremez BlogVitali Kremez
Let's Learn: Lethic Spambot & Survey of Anti-Analysis Techniques
Lethic
2017-11-02Malware Traffic AnalysisBrad Duncan
2017-11-02 - ADVENTURES WITH SMOKE LOADER
Lethic
2017-11-01Virus BulletinPatrick Wardle
Offensive malware analysis: dissecting OSX/FruitFly.B via a custom C&C server
FruitFly
2017-10-13Malware Traffic AnalysisBrad Duncan
Blank Slate Malspam Stops Pushing Locky, Starts Pushing Sage 2.2 Randsomware
SAGE
2017-10-05Angel Alonso-Parrizas
Analysis of a malicious DOC used by Turla APT group; hunting persistence via PowerShell
KopiLuwak