Click here to download all references as Bib-File.•
2014-09-05
⋅
Google
⋅
Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family X-Agent |
2014-08-07
⋅
Secureworks
⋅
Malware Analysis of the Lurk Downloader Lurk |
2014-08-01
⋅
Coding and Security
⋅
Soraya Malware Analysis - Dropper soraya |
2014-07-16
⋅
StopMalvertising
⋅
Mini Analysis of the TinyBanker Tinba Tinba |
2014-07-15
⋅
Palo Alto Networks Unit 42
⋅
Unit 42 Technical Analysis: Seaduke SEADADDY |
2014-07-07
⋅
Disect Android APKs like a Pro - Static code analysis Retefe |
2014-06-02
⋅
G Data
⋅
Analysis of Uroburos, using WinDbg Uroburos |
2014-05-01
⋅
Recorded Future
⋅
Hunting Hidden Lynx: How OSINT is Crucial for APT Analysis APT17 |
2014-04-27
⋅
StopMalvertising
⋅
Analysis of the Predator Pain Keylogger HawkEye Keylogger |
2014-04-17
⋅
Nettitude Labs
⋅
A quick analysis of the latest Shadow Brokers dump DarkPulsar |
2014-03-18
⋅
Windigo Linux Analysis – Ebury and Cdorked CDorked |
2014-02-21
⋅
ESET Research
⋅
An In‑depth Analysis of Linux/Ebury Ebury |
2014-02-16
⋅
Put As blog
⋅
Analysis of CoinThief/A "dropper" CoinThief |
2014-02-14
⋅
Secureworks
⋅
Analysis of DHS NCCIC Indicators jspRAT BeepService DDKeylogger LinseningSvr ONHAT SimpleFileMover ZiyangRAT |
2014-01-01
⋅
circl.lu
⋅
TR-25 Analysis - Turla / Pfinet / Snake/ Uroburos Cobra Carbon System Uroburos Turla |
2013-12-12
⋅
Checkpoint
⋅
Malware Research Group HIMAN Malware Analysis himan |
2013-10-01
⋅
MALWARE Conference
⋅
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus Gameover P2P |
2013-09-24
⋅
AT&T
⋅
OSX/Leverage.a Analysis Leverage |
2013-09-18
⋅
Zscaler
⋅
A New Wave Of WIN32/CAPHAW Attacks - A ThreatLabZ Analysis Shylock |
2013-09-01
⋅
Eternal Todo
⋅
Yet another Andromeda / Gamarue analysis Andromeda |