Click here to download all references as Bib-File.•
| 2018-07-18
⋅
⋅
ASEC
⋅
GandCrab v4.1.2 Encryption Blocking Method (Kill Switch) Gandcrab |
| 2018-07-13
⋅
Palo Alto Networks Unit 42
⋅
Upatre Continued to Evolve with new Anti-Analysis Techniques Upatre |
| 2018-07-11
⋅
Microsoft
⋅
Hawkeye Keylogger – Reborn v8: An in-depth campaign analysis HawkEye Keylogger |
| 2018-07-10
⋅
Carbon Black
⋅
Carbon Black TAU Threat Analysis: Recent Dharma Ransomware Highlights Attackers’ Continued Use of Open-Source Tools Dharma |
| 2018-06-29
⋅
G Data
⋅
Where we go, we don't need files: Analysis of fileless malware "Rozena" Rozena |
| 2018-06-23
⋅
Salesforce Engineering
⋅
Malware Analysis: Kardon Loader Kardon Loader |
| 2018-06-19
⋅
CERT.PL
⋅
Backswap malware analysis BackSwap |
| 2018-05-25
⋅
360
⋅
Analysis of CVE-2018-8174 VBScript 0day and APT actor related to Office targeted attack Retro |
| 2018-05-21
⋅
CrowdStrike
⋅
An In-Depth Analysis of Samsam Ransomware and BOSS SPIDER SamSam |
| 2018-05-20
⋅
Youtube (OALabs)
⋅
Unpacking Gootkit Part 2 - Debugging Anti-Analysis Tricks With IDA Pro and x64dbg GootKit |
| 2018-05-09
⋅
COUNT UPON SECURITY
⋅
Malware Analysis - PlugX - Part 2 PlugX |
| 2018-05-08
⋅
Security 0wnage
⋅
Clearing the MuddyWater - Analysis of new MuddyWater Samples POWERSTATS |
| 2018-05-01
⋅
Sophos
⋅
VPNFilter Botnet - a SophosLabs Analysis VPNFilter |
| 2018-04-24
⋅
ESET Research
⋅
Sednit update: Analysis of Zebrocy Zebrocy Zebrocy (AutoIT) |
| 2018-04-16
⋅
Salesforce
⋅
Malware Analysis: New Trojan Double Dropper Schneiken |
| 2018-04-13
⋅
Vitali Kremez Blog
⋅
Let's Learn: In-Depth Dive into Gootkit Banker Version 4 Malware Analysis |
| 2018-04-05
⋅
Fortinet
⋅
Analysis of New Agent Tesla Spyware Variant Agent Tesla |
| 2018-03-30
⋅
⋅
360 Threat Intelligence
⋅
Analysis of the latest cyber attack activity of the APT organization against sensitive institutions in China Quasar RAT |
| 2018-03-29
⋅
Stormshield
⋅
In-depth Formbook malware analysis – Obfuscation and process injection Formbook |
| 2018-03-28
⋅
Malwarebytes
⋅
An in-depth malware analysis of QuantLoader QuantLoader |