Click here to download all references as Bib-File.•
2022-10-13
⋅
HP
⋅
Magniber Ransomware Adopts JavaScript, Targeting Home Users with Fake Software Updates Magniber |
2022-07-15
⋅
HP
⋅
Stealthy OpenDocument Malware Deployed Against Latin American Hotels AsyncRAT |
2022-06-06
⋅
HP
⋅
SVCReady: A New Loader Gets Ready SVCReady |
2022-05-20
⋅
HP
⋅
PDF Malware Is Not Yet Dead 404 Keylogger |
2022-05-04
⋅
HP
⋅
Tips for Automating IOC Extraction from GootLoader, a Changing JavaScript Malware GootLoader |
2022-04-12
⋅
HP
⋅
Malware Campaigns Targeting African Banking Sector CloudEyE Remcos |
2022-02-08
⋅
HP
⋅
Attackers Disguise RedLine Stealer as a Windows 11 Upgrade RedLine Stealer |
2022-01-14
⋅
HP
⋅
How Attackers Use XLL Malware to Infect Systems |
2021-12-09
⋅
HP
⋅
Emotet’s Return: What’s Different? Emotet |
2021-11-23
⋅
HP
⋅
RATDispenser: Stealthy JavaScript Loader Dispensing RATs into the Wild AdWind Ratty STRRAT CloudEyE Formbook Houdini Panda Stealer Remcos |
2021-09-19
⋅
HP
⋅
MirrorBlast and TA505: Examining Similarities in Tactics, Techniques and Procedures MirrorBlast |
2021-07-30
⋅
HP
⋅
Detecting TA551 domains Valak Dridex IcedID ISFB QakBot |
2021-06-28
⋅
HP
⋅
Snake Keylogger’s Many Skins: Analysing Code Reuse Among Infostealers 404 Keylogger Phoenix Keylogger |
2021-04-14
⋅
HP
⋅
From PoC to Exploit Kit: Purple Fox now exploits CVE-2021-26411 PurpleFox |
2021-01-19
⋅
HP
⋅
Dridex Malicious Document Analysis: Automating the Extraction of Payload URLs Dridex |