Click here to download all references as Bib-File.•
2016-07-12
⋅
Malware Discovered – SFG: Furtim Malware Analysis |
2016-05-23
⋅
Reporting and Analysis Centre for Information Assurance MELANI
⋅
Technical Report about the Malware used in the Cyberespionage against RUAG Turla |
2016-05-17
⋅
ESET Research
⋅
Operation Groundbait: Analysis of a surveillance toolkit Prikormka |
2016-05-09
⋅
Malware Traffic Analysis
⋅
PseudoDarkLeech Angler EK from 185.118.66.154 sends Bedep/CryptXXX Bedep Unidentified 025 (Clickfraud) |
2016-01-23
⋅
LinkCabin
⋅
Imminent Monitor 4 RAT Analysis – A Glance Imminent Monitor RAT |
2016-01-01
⋅
Group-IB
⋅
Analysis of Attacks against Trading and Bank Card Systems Ranbyus |
2016-01-01
⋅
Forcepoint
⋅
Analysis of a Botnet Campaign Jaku |
2015-12-26
⋅
Flashpoint
⋅
Backdoor: Win32/Hesetox.A: vSkimmer POS Malware Analysis vSkimmer |
2015-12-01
⋅
CERT.PL
⋅
ZeuS-P2P monitoring and analysis Gameover P2P |
2015-11-30
⋅
0x3A Security
⋅
Inside Braviax/FakeRean: An analysis and history of a FakeAV family |
2015-11-20
⋅
A king's ransom: an analysis of the CTB-locker ransomware CTB Locker |
2015-10-09
⋅
InfoSec Institute
⋅
Beta Bot Analysis: Part 1 |
2015-10-06
⋅
Palo Alto Networks Unit 42
⋅
Ticked Off: Upatre Malware’s Simple Anti-analysis Trick to Defeat Sandboxes Upatre |
2015-09-29
⋅
InfoSec Institute
⋅
Andromeda Bot Analysis part 1 Andromeda |
2015-09-29
⋅
InfoSec Institute
⋅
Andromeda Bot Analysis part 2 Andromeda |
2015-09-11
⋅
GovCERT.ch
⋅
Fobber Analysis Fobber |
2015-08-10
⋅
shadowserver
⋅
The Italian Connection: An analysis of exploit supply chains and digital quartermasters smac APT20 |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-30
⋅
ESET Research
⋅
Operation Potao Express: Analysis of a cyber‑espionage toolkit FakeTC |
2015-07-23
⋅
SecurityIntelligence
⋅
An Analysis of the Qadars Banking Trojan Qadars |