Click here to download all references as Bib-File.•
| 2019-07-22
⋅
Intrusiontruth
⋅
Who is Mr Zeng? |
| 2019-07-22
⋅
One Night in Norfolk
⋅
The Lazarus Injector |
| 2019-07-22
⋅
One Night in Norfolk
⋅
APT33 PowerShell Malware POWERTON |
| 2019-07-22
⋅
Fortinet
⋅
A Deep Dive Into IcedID Malware: Part III - Analysis of Child Processes |
| 2019-07-22
⋅
Proofpoint
⋅
BrushaLoader still sweeping up victims one year later BrushaLoader NARWHAL SPIDER |
| 2019-07-21
⋅
One Night in Norfolk
⋅
Emissary Panda DLL Backdoor HyperSSL |
| 2019-07-19
⋅
Intrusiontruth
⋅
Who is Mr Wang? |
| 2019-07-19
⋅
Bleeping Computer
⋅
Elusive MegaCortex Ransomware Found - Here is What We Know MegaCortex |
| 2019-07-19
⋅
ANY.RUN
⋅
ANY.RUN analysis on URL ZUpdater |
| 2019-07-19
⋅
HP
⋅
An Analysis of L0rdix RAT, Panel and Builder L0rdix |
| 2019-07-18
⋅
Github (ZLab-Cybaze-Yoroi)
⋅
ZLab - LooCipher Decryption Tool |
| 2019-07-18
⋅
FireEye
⋅
Hard Pass: Declining APT34’s Invite to Join Their Professional Network LONGWATCH PICKPOCKET TONEDEAF VALUEVAULT |
| 2019-07-18
⋅
Android Malware Analysis : Dissecting Hydra Dropper Hydra |
| 2019-07-18
⋅
ESET Research
⋅
Okrum: Ke3chang group targets diplomatic missions Ketrican Okrum |
| 2019-07-17
⋅
Intrusiontruth
⋅
Who is Mr Guo? |
| 2019-07-17
⋅
Intezer
⋅
EvilGnome: Rare Malware Spying on Linux Desktop Users EvilGnome |
| 2019-07-16
⋅
G Data
⋅
Analysis: Server-side polymorphism & PowerShell backdoors Rozena |
| 2019-07-16
⋅
enSilo
⋅
The Avast Abuser: Metamorfo Banking Malware Hides By Abusing Avast Executable Metamorfo |
| 2019-07-15
⋅
Blackberry
⋅
Threat Spotlight: Virlock Polymorphic Ransomware VirLock |
| 2019-07-15
⋅
Intrusiontruth
⋅
Is there a pattern? |