Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-06-13Avast DecodedJan Neduchal, David Álvarez
@online{neduchal:20220613:linux:67027a5, author = {Jan Neduchal and David Álvarez}, title = {{Linux Threat Hunting: ‘Syslogk’ a kernel rootkit found under development in the wild}}, date = {2022-06-13}, organization = {Avast Decoded}, url = {https://decoded.avast.io/davidalvarez/linux-threat-hunting-syslogk-a-kernel-rootkit-found-under-development-in-the-wild/}, language = {English}, urldate = {2022-06-15} } Linux Threat Hunting: ‘Syslogk’ a kernel rootkit found under development in the wild
Rekoobe
2022-02-03AvastDavid Álvarez Pérez, Jan Neduchal
@online{prez:20220203:analysis:73b6f36, author = {David Álvarez Pérez and Jan Neduchal}, title = {{Analysis of Attack Against National Games of China Systems}}, date = {2022-02-03}, organization = {Avast}, url = {https://decoded.avast.io/janneduchal/analysis-of-attack-against-national-games-of-china-systems/}, language = {English}, urldate = {2022-02-04} } Analysis of Attack Against National Games of China Systems
2018-12-04AvastAdolf Středa, Jan Neduchal
@online{steda:20181204:hide:4927f2a, author = {Adolf Středa and Jan Neduchal}, title = {{Hide ‘N Seek botnet continues infecting devices with default credentials, building a P2P network and more.}}, date = {2018-12-04}, organization = {Avast}, url = {https://blog.avast.com/hide-n-seek-botnet-continues}, language = {English}, urldate = {2019-11-26} } Hide ‘N Seek botnet continues infecting devices with default credentials, building a P2P network and more.
Hide and Seek