Click here to download all references as Bib-File.•
2017-06-13
⋅
Dragos
⋅
CRASHOVERRIDE: Analysis of the Threatto Electric Grid Operations Industroyer Sandworm |
2017-06-12
⋅
Malware Traffic Analysis
⋅
2017-06-12 - LOKI BOT MALSPAM - SUBJECT: RE: PURCHASE ORDER 457211 |
2017-06-05
⋅
Set up your own malware analysis lab with VirtualBox, INetSim and Burp TeslaCrypt |
2017-05-30
⋅
CERT.PL
⋅
Mole ransomware: analysis and decryptor Mole |
2017-05-25
⋅
Flashpoint
⋅
Linguistic Analysis of WannaCry Ransomware Messages Suggests Chinese-Speaking Authors WannaCryptor |
2017-05-24
⋅
CERT.PL
⋅
Analysis of Emotet v4 Emotet |
2017-05-16
⋅
Malware Traffic Analysis
⋅
2017-05-16 - MORE EXAMPLES OF MALSPAM PUSHING JAFF RANSOMWARE Jaff |
2017-05-09
⋅
Fortinet
⋅
Deep Analysis of New Emotet Variant – Part 2 |
2017-05-09
⋅
Malware Traffic Analysis
⋅
RIG EK SENDS BUNITU TROJAN Bunitu |
2017-05-03
⋅
Fortinet
⋅
Deep Analysis of New Emotet Variant - Part 1 Emotet |
2017-04-27
⋅
ColinGuru
⋅
Advanced Banload Analysis Banload |
2017-04-25
⋅
Malware Traffic Analysis
⋅
2017-04-25 - "GOOD MAN" CAMPAIGN RIG EK SENDS LATENTBOT LatentBot |
2017-04-13
⋅
A blog about rootkits research and the Windows kernel
⋅
Stuxnet drivers: detailed analysis Stuxnet |
2017-04-03
⋅
Malware Traffic Analysis
⋅
DHL Invoice Malspam/Photo Malspam Pushdo |
2017-04-01
⋅
Lookout
⋅
Pegasus for Android: Technical Analysis and Findings of Chrysaor Chrysaor |
2017-03-30
⋅
EquationDrug rootkit analysis (mstcp32.sys) EquationDrug |
2017-03-14
⋅
Broad Analysis
⋅
Rig Exploit Kit via the EiTest delivers CryptoShield/REVENGE ransomware CryptoShield |
2017-02-14
⋅
CERT.PL
⋅
Sage 2.0 analysis SAGE |
2017-02-10
⋅
Department of Homeland Security
⋅
AR-17-20045 - Enhanced Analysis of GRIZZLY STEPPE Activity APT29 |
2017-02-05
⋅
VinRansomware
⋅
Detailed threat analysis of Shamoon 2.0 Malware DistTrack |