Click here to download all references as Bib-File.•
| 2017-08-13
⋅
Analysis of APT28 hospitality malware (Part 2) Seduploader |
| 2017-08-05
⋅
Fortinet
⋅
Analysis of New GlobeImposter Ransomware Variant GlobeImposter |
| 2017-08-04
⋅
PhishLabs
⋅
Smoke Loader Adds Additional Obfuscation Methods to Mitigate Analysis SmokeLoader |
| 2017-07-04
⋅
Malware Traffic Analysis
⋅
MALSPAM WITH JAVA-BASED RAT AdWind |
| 2017-07-04
⋅
ESET Research
⋅
Analysis of TeleBots’ cunning backdoor TeleDoor |
| 2017-07-03
⋅
CrowdStrike
⋅
NotPetya Technical Analysis Part II: Further Findings and Potential for MBR Recovery EternalPetya |
| 2017-07-01
⋅
vallejo.cc
⋅
Analysis of new variant of Konni RAT Konni |
| 2017-06-28
⋅
Fortinet
⋅
In-Depth Analysis of A New Variant of .NET Malware AgentTesla Agent Tesla |
| 2017-06-22
⋅
G Data
⋅
Analysis Results of Zeus.Variant.Panda PandaBanker |
| 2017-06-13
⋅
Dragos
⋅
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations ENERGETIC BEAR |
| 2017-06-13
⋅
Dragos
⋅
CRASHOVERRIDE: Analysis of the Threatto Electric Grid Operations Industroyer Sandworm |
| 2017-06-12
⋅
Malware Traffic Analysis
⋅
2017-06-12 - LOKI BOT MALSPAM - SUBJECT: RE: PURCHASE ORDER 457211 |
| 2017-06-05
⋅
Set up your own malware analysis lab with VirtualBox, INetSim and Burp TeslaCrypt |
| 2017-05-30
⋅
CERT.PL
⋅
Mole ransomware: analysis and decryptor Mole |
| 2017-05-25
⋅
Flashpoint
⋅
Linguistic Analysis of WannaCry Ransomware Messages Suggests Chinese-Speaking Authors WannaCryptor |
| 2017-05-24
⋅
CERT.PL
⋅
Analysis of Emotet v4 Emotet |
| 2017-05-16
⋅
Malware Traffic Analysis
⋅
2017-05-16 - MORE EXAMPLES OF MALSPAM PUSHING JAFF RANSOMWARE Jaff |
| 2017-05-09
⋅
Fortinet
⋅
Deep Analysis of New Emotet Variant – Part 2 |
| 2017-05-09
⋅
Malware Traffic Analysis
⋅
RIG EK SENDS BUNITU TROJAN Bunitu |
| 2017-05-03
⋅
Fortinet
⋅
Deep Analysis of New Emotet Variant - Part 1 Emotet |