Click here to download all references as Bib-File.•
2011-06-03
⋅
Sourceforge
⋅
Ani-Shell Ani-Shell |
2011-06-03
⋅
⋅
CERT Polska / NASK
⋅
Botnet Hamweq - analiza Hamweq |
2011-05-25
⋅
Contagio Dump
⋅
W32.Qakbot aka W32/Pinkslipbot or infostealer worm QakBot |
2011-05-19
⋅
Microsoft
⋅
Win32/Expiro Expiro |
2011-04-30
⋅
evild3ad blog
⋅
BKA-Trojaner (Ransomware) BKA Trojaner |
2011-04-28
⋅
Un observateur d’événements aveugle… MimiKatz |
2011-04-26
⋅
SpyEye Targets Opera, Google Chrome Users SpyEye |
2011-04-19
⋅
InfoSec Institute
⋅
TDSS part 1: The x64 Dollar Question |
2011-03-28
⋅
KrebsOnSecurity
⋅
Microsoft Hunting Rustock Controllers Rustock |
2011-03-22
⋅
FireEye
⋅
Harnig Botnet: a retreating army Harnig |
2011-03-11
⋅
Symantec
⋅
Trojan.Koredos Comes with an Unwelcomed Surprise Lazarus Group |
2011-03-11
⋅
Symantec
⋅
Trojan.Koredos Comes with an Unwelcomed Surprise Lazarus Group |
2011-03-08
⋅
Microsoft Security Intelligence
⋅
Worm:Win32/Yimfoca.A Buzus |
2011-03-02
⋅
ESET Research
⋅
TDL4 and Glupteba: Piggyback PiggyBugs Glupteba |
2011-02-24
⋅
Contagiodump Blog
⋅
ZeroAccess / Max++ / Smiscer Crimeware Rootkit sample for Step-by-Step Reverse Engineering by Giuseppe Bonfa - << (Update 2011 version available) ZeroAccess |
2011-02-10
⋅
McAfee
⋅
Global Energy Cyberattacks: “Night Dragon” Night Dragon |
2011-01-30
⋅
GpCode Ransomware 2010 Simple Analysis GPCode |
2011-01-20
⋅
⋅
Beschreibung des Virus Backdoor.Win32. Buterat.afj Buterat |
2011-01-09
⋅
Contagio Dump
⋅
Jan 6 CVE-2010-3333 DOC with info theft trojan from the American Chamber of Commerce playwork |
2011-01-03
⋅
ESET Research
⋅
Stuxnet Under the Microscope Stuxnet |