Click here to download all references as Bib-File.•
| 2016-11-23
⋅
G Data
⋅
Analysis: Ursnif - spying on your data since 2007 Gozi |
| 2016-11-21
⋅
NowSecure
⋅
Android malware analysis with Radare: Dissecting the Triada Trojan Triada |
| 2016-11-08
⋅
SentinelOne
⋅
Analysis of IOS.GUIINJECT Adware Library GuiInject |
| 2016-10-27
⋅
Sekoia
⋅
Rootkit analysisUse case on HideDRV HideDRV |
| 2016-10-27
⋅
Simon Roses Femerling Blog
⋅
Mirai DDoS Botnet: Source Code & Binary Analysis Mirai |
| 2016-10-24
⋅
Lastline
⋅
Evasive Malware Detects and Defeats Virtual Machine Analysis |
| 2016-10-16
⋅
RapidityNetworks
⋅
Hajime: Analysis of a decentralizedinternet worm for IoT devices Hajime |
| 2016-10-11
⋅
Remsec driver analysis - Part 3 Remsec |
| 2016-10-10
⋅
Remsec driver analysis - Part 2 Remsec |
| 2016-10-03
⋅
Remsec driver analysis Remsec |
| 2016-09-13
⋅
Cisco
⋅
H1N1: Technical analysis reveals new capabilities H1N1 Loader |
| 2016-08-08
⋅
Forcepoint
⋅
MONSOON - Analysis Of An APT Campaign BadNews TinyTyphon QUILTED TIGER |
| 2016-08-08
⋅
Forcepoint
⋅
MONSOON – ANALYSIS OF AN APT CAMPAIGN BadNews TinyTyphon QUILTED TIGER |
| 2016-08-01
⋅
Uperesia
⋅
Analysis of a packed Pony downloader Pony |
| 2016-08-01
⋅
Malwarebytes
⋅
Shakti Trojan: Technical Analysis Shakti |
| 2016-07-12
⋅
Malware Discovered – SFG: Furtim Malware Analysis |
| 2016-05-23
⋅
Reporting and Analysis Centre for Information Assurance MELANI
⋅
Technical Report about the Malware used in the Cyberespionage against RUAG Turla |
| 2016-05-17
⋅
ESET Research
⋅
Operation Groundbait: Analysis of a surveillance toolkit Prikormka |
| 2016-05-09
⋅
Malware Traffic Analysis
⋅
PseudoDarkLeech Angler EK from 185.118.66.154 sends Bedep/CryptXXX Bedep Unidentified 025 (Clickfraud) |
| 2016-01-23
⋅
LinkCabin
⋅
Imminent Monitor 4 RAT Analysis – A Glance Imminent Monitor RAT |