Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-06-13DragosDragos
CRASHOVERRIDE: Analysis of the Threatto Electric Grid Operations
Industroyer Sandworm
2017-06-12Malware Traffic AnalysisBrian Duncan
2017-06-12 - LOKI BOT MALSPAM - SUBJECT: RE: PURCHASE ORDER 457211
2017-06-05Christophe Tafani-Dereeper
Set up your own malware analysis lab with VirtualBox, INetSim and Burp
TeslaCrypt
2017-05-30CERT.PLJarosław Jedynak
Mole ransomware: analysis and decryptor
Mole
2017-05-25FlashpointFlashpoint
Linguistic Analysis of WannaCry Ransomware Messages Suggests Chinese-Speaking Authors
WannaCryptor
2017-05-24CERT.PLPaweł Srokosz
Analysis of Emotet v4
Emotet
2017-05-16Malware Traffic AnalysisBrad Duncan
2017-05-16 - MORE EXAMPLES OF MALSPAM PUSHING JAFF RANSOMWARE
Jaff
2017-05-09FortinetXiaopeng Zhang
Deep Analysis of New Emotet Variant – Part 2
2017-05-09Malware Traffic AnalysisBrad Duncan
RIG EK SENDS BUNITU TROJAN
Bunitu
2017-05-03FortinetXiaopeng Zhang
Deep Analysis of New Emotet Variant - Part 1
Emotet
2017-04-27ColinGuruColin Hardy
Advanced Banload Analysis
Banload
2017-04-25Malware Traffic AnalysisBrian Duncan
2017-04-25 - "GOOD MAN" CAMPAIGN RIG EK SENDS LATENTBOT
LatentBot
2017-04-13A blog about rootkits research and the Windows kernelArtem Baranov
Stuxnet drivers: detailed analysis
Stuxnet
2017-04-03Malware Traffic AnalysisBrad Duncan
DHL Invoice Malspam/Photo Malspam
Pushdo
2017-04-01LookoutLookout
Pegasus for Android: Technical Analysis and Findings of Chrysaor
Chrysaor
2017-03-30Artem Baranov
EquationDrug rootkit analysis (mstcp32.sys)
EquationDrug
2017-03-14Broad AnalysisBroad Analysis
Rig Exploit Kit via the EiTest delivers CryptoShield/REVENGE ransomware
CryptoShield
2017-02-14CERT.PLJarosław Jedynak
Sage 2.0 analysis
SAGE
2017-02-10Department of Homeland SecurityCommunications Integration Center, National Cybersecurity
AR-17-20045 - Enhanced Analysis of GRIZZLY STEPPE Activity
APT29
2017-02-05VinRansomwareGregory Paul, Shaunak
Detailed threat analysis of Shamoon 2.0 Malware
DistTrack