Click here to download all references as Bib-File.
2022-10-13 ⋅ HP ⋅ Magniber Ransomware Adopts JavaScript, Targeting Home Users with Fake Software Updates Magniber |
2022-07-15 ⋅ HP ⋅ Stealthy OpenDocument Malware Deployed Against Latin American Hotels AsyncRAT |
2022-06-06 ⋅ HP ⋅ SVCReady: A New Loader Gets Ready SVCReady |
2022-05-20 ⋅ HP ⋅ PDF Malware Is Not Yet Dead 404 Keylogger |
2022-05-04 ⋅ HP ⋅ Tips for Automating IOC Extraction from GootLoader, a Changing JavaScript Malware GootLoader |
2022-04-12 ⋅ HP ⋅ Malware Campaigns Targeting African Banking Sector CloudEyE Remcos |
2022-02-08 ⋅ HP ⋅ Attackers Disguise RedLine Stealer as a Windows 11 Upgrade RedLine Stealer |
2022-01-14 ⋅ HP ⋅ How Attackers Use XLL Malware to Infect Systems |
2021-12-09 ⋅ HP ⋅ Emotet’s Return: What’s Different? Emotet |
2021-11-23 ⋅ HP ⋅ RATDispenser: Stealthy JavaScript Loader Dispensing RATs into the Wild AdWind Ratty STRRAT CloudEyE Formbook Houdini Panda Stealer Remcos |
2021-09-19 ⋅ HP ⋅ MirrorBlast and TA505: Examining Similarities in Tactics, Techniques and Procedures MirrorBlast |
2021-07-30 ⋅ HP ⋅ Detecting TA551 domains Valak Dridex IcedID ISFB QakBot |
2021-06-28 ⋅ HP ⋅ Snake Keylogger’s Many Skins: Analysing Code Reuse Among Infostealers 404 Keylogger Phoenix Keylogger |
2021-04-14 ⋅ HP ⋅ From PoC to Exploit Kit: Purple Fox now exploits CVE-2021-26411 PurpleFox |
2021-01-19 ⋅ HP ⋅ Dridex Malicious Document Analysis: Automating the Extraction of Payload URLs Dridex |