Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-01-13TrustwaveLloyd Macrohon, Rodel Mendrez
Decrypting Qakbot’s Encrypted Registry Keys
QakBot
2021-10-15TrustwaveLloyd Macrohon, Rodel Mendrez
BlackByte Ransomware – Pt 2. Code Obfuscation Analysis
2021-10-15TrustwaveLloyd Macrohon, Rodel Mendrez
BlackByte Ransomware – Pt. 1 In-depth Analysis
2021-07-03Twitter (@LloydLabs)Lloyd
Twitter Thread on Revil sideloading DLL used in Kaseya attack
REvil
2021-05-04TrustwaveLloyd Macrohon, Rodel Mendrez
Pingback: Backdoor At The End Of The ICMP Tunnel
PingBack
2020-04-10TrustwaveJoshua Deacon, Lloyd Macrohon
An In-depth Look at MailTo Ransomware, Part Three of Three
Mailto
2020-04-08TrustwaveJoshua Deacon, Lloyd Macrohon
An In-depth Look at MailTo Ransomware, Part Two of Three
Mailto
2020-03-31TrustwaveJoshua Deacon, Lloyd Macrohon
An In-depth Look at MailTo Ransomware, Part One of Three
Mailto
2017-11-17LloydLabsLloyd Davies
[Part 1] - Analysing the New Linux/AES.DDoS IoT Malware
MrBlack
2007-04-03USENIXKen Chiang, Levi Lloyd
A Case Study of the Rustock Rootkit and Spam Bot
Rustock