Click here to download all references as Bib-File.•
2016-09-13
⋅
Cisco
⋅
H1N1: Technical analysis reveals new capabilities H1N1 Loader |
2016-08-08
⋅
Forcepoint
⋅
MONSOON - Analysis Of An APT Campaign BadNews TinyTyphon QUILTED TIGER |
2016-08-08
⋅
Forcepoint
⋅
MONSOON – ANALYSIS OF AN APT CAMPAIGN BadNews TinyTyphon QUILTED TIGER |
2016-08-01
⋅
Uperesia
⋅
Analysis of a packed Pony downloader Pony |
2016-08-01
⋅
Malwarebytes
⋅
Shakti Trojan: Technical Analysis Shakti |
2016-07-12
⋅
Malware Discovered – SFG: Furtim Malware Analysis |
2016-05-23
⋅
Reporting and Analysis Centre for Information Assurance MELANI
⋅
Technical Report about the Malware used in the Cyberespionage against RUAG Turla |
2016-05-17
⋅
ESET Research
⋅
Operation Groundbait: Analysis of a surveillance toolkit Prikormka |
2016-05-09
⋅
Malware Traffic Analysis
⋅
PseudoDarkLeech Angler EK from 185.118.66.154 sends Bedep/CryptXXX Bedep Unidentified 025 (Clickfraud) |
2016-01-23
⋅
LinkCabin
⋅
Imminent Monitor 4 RAT Analysis – A Glance Imminent Monitor RAT |
2016-01-01
⋅
Group-IB
⋅
Analysis of Attacks against Trading and Bank Card Systems Ranbyus |
2016-01-01
⋅
Forcepoint
⋅
Analysis of a Botnet Campaign Jaku |
2015-12-26
⋅
Flashpoint
⋅
Backdoor: Win32/Hesetox.A: vSkimmer POS Malware Analysis vSkimmer |
2015-12-01
⋅
CERT.PL
⋅
ZeuS-P2P monitoring and analysis Gameover P2P |
2015-11-30
⋅
0x3A Security
⋅
Inside Braviax/FakeRean: An analysis and history of a FakeAV family |
2015-11-20
⋅
A king's ransom: an analysis of the CTB-locker ransomware CTB Locker |
2015-10-09
⋅
InfoSec Institute
⋅
Beta Bot Analysis: Part 1 |
2015-10-06
⋅
Palo Alto Networks Unit 42
⋅
Ticked Off: Upatre Malware’s Simple Anti-analysis Trick to Defeat Sandboxes Upatre |
2015-09-29
⋅
InfoSec Institute
⋅
Andromeda Bot Analysis part 1 Andromeda |
2015-09-29
⋅
InfoSec Institute
⋅
Andromeda Bot Analysis part 2 Andromeda |