|
Up
|
|
|
|
|
2018-01-01 - Analyzing Ramnit used in Seamless campaign.pdf
|
|
|
|
|
2018-01-02 - Burping on MuddyWater.pdf
|
|
|
|
|
2018-01-04 - Iran’s Cyber Ecosystem- Who Are the Threat Actors-.pdf
|
|
|
|
|
2018-01-04 - MALSPAM PUSHING PCRAT-GH0ST.pdf
|
|
|
|
|
2018-01-06 - Ostap malware analysis (Backswap dropper).pdf
|
|
|
|
|
2018-01-08 - SkyRAT Powershell RAT.pdf
|
|
|
|
|
2018-01-09 - BestKorea.pdf
|
|
|
|
|
2018-01-10 - Analysis of BlackTech's latest APT attack.pdf
|
|
|
|
|
2018-01-10 - Hack Brief- Russian Hackers Release Apparent IOC Emails in Wake of Olympic Ban.pdf
|
|
|
|
|
2018-01-10 - Taiwanese cops give malware-laden USB sticks as prizes for security quiz.pdf
|
|
|
|
|
2018-01-11 - Ay MaMi.pdf
|
|
|
|
|
2018-01-11 - Malspam Entitled “Invoice attched for your reference” Delivers Agent Tesla Keylogger.pdf
|
|
|
|
|
2018-01-12 - Fake Spectre and Meltdown patch pushes Smoke Loader malware.pdf
|
|
|
|
|
2018-01-12 - Holiday lull- Not so much.pdf
|
|
|
|
|
2018-01-12 - Malware Displaying Porn Ads Discovered in Game Apps on Google Play.pdf
|
|
|
|
|
2018-01-12 - Sonja Analysis.pdf
|
|
|
|
|
2018-01-15 - Bootkits are not dead. Pitou is back!.pdf
|
|
|
|
|
2018-01-15 - GlobeImposter ransomware- A holiday gift from the Necurs botnet.pdf
|
|
|
|
|
2018-01-15 - New KillDisk Variant Hits Financial Organizations in Latin America.pdf
|
|
|
|
|
2018-01-16 - Analyzing the TRITON industrial malware.pdf
|
|
|
|
|
2018-01-16 - Anatomy of the thread suspension mechanism in Windows (Windows Internals).pdf
|
|
|
|
|
2018-01-16 - First Activities of Cobalt Group in 2018- Spear Phishing Russian Banks.pdf
|
|
|
|
|
2018-01-16 - GlobeImposter Ransomware.pdf
|
|
|
|
|
2018-01-16 - Korea In The Crosshairs.pdf
|
|
|
|
|
2018-01-16 - Skygofree- Following in the footsteps of HackingTeam.pdf
|
|
|
|
|
2018-01-16 - Threat Spotlight- LockPOS Point of Sale Malware.pdf
|
|
|
|
|
2018-01-17 - A coin miner with a “Heaven’s Gate”.pdf
|
|
|
|
|
2018-01-17 - Art of Steal- Satori Variant is Robbing ETH BitCoin by Replacing Wallet Address.pdf
|
|
|
|
|
2018-01-17 - Exobot Author Calls It Quits and Sells Off Banking Trojan Source Code.pdf
|
|
|
|
|
2018-01-17 - Microsoft Office Vulnerabilities Used to Distribute Zyklon Malware in Recent Campaign.pdf
|
|
|
|
|
2018-01-17 - Reviewing the spam filters- Malspam pushing Gozi-ISFB.pdf
|
|
|
|
|
2018-01-17 - Turla group malware.pdf
|
|
|
|
|
2018-01-17 - Zumanek- novo malware tenta roubar credenciais de serviços das vítimas.pdf
|
|
|
|
|
2018-01-18 - The ARC of Satori.pdf
|
|
|
|
|
2018-01-21 - Evrial Trojan Switches Bitcoin Addresses Copied to Windows Clipboard.pdf
|
|
|
|
|
2018-01-22 - Op EvilTraffic CSE CybSec ZLAB Malware Analysis Report – Exclusive, tens of thousands of compromised sites involved in a new massive malvertising campaign.pdf
|
|
|
|
|
2018-01-22 - Paradise Ransomware strikes again.pdf
|
|
|
|
|
2018-01-22 - SamSam - The Evolution Continues Netting Over $325,000 in 4 Weeks.pdf
|
|
|
|
|
2018-01-22 - This hacking gang just updated the malware it uses against UK targets.pdf
|
|
|
|
|
2018-01-23 - A Walk-Through Tutorial, with Code, on Statically Unpacking the FinSpy VM- Part One, x86 Deobfuscation.pdf
|
|
|
|
|
2018-01-23 - Espionage Campaign Leverages Spear Phishing, RATs Against Turkish Defense Contractors.pdf
|
|
|
|
|
2018-01-23 - Maldoc (RTF) drops Loda Logger.pdf
|
|
|
|
|
2018-01-23 - Satori Author Linked to New Mirai Variant Masuta.pdf
|
|
|
|
|
2018-01-23 - Uncovering 2017’s Largest Malvertising Operation.pdf
|
|
|
|
|
2018-01-24 - A Look into the Lazarus Group’s Operations.pdf
|
|
|
|
|
2018-01-24 - Analyzing CrossRAT- A cross-platform implant, utilized in a global cyber-espionage campaign.pdf
|
|
|
|
|
2018-01-24 - Lazarus Campaign Targeting Cryptocurrencies Reveals Remote Controller Tool, an Evolved RATANKBA, and More.pdf
|
|
|
|
|
2018-01-24 - New Hide ‘N Seek IoT Botnet using custom-built Peer-to-Peer communication spotted in the wild.pdf
|
|
|
|
|
2018-01-24 - New HNS IoT Botnet Has Already Amassed 14K Bots.pdf
|
|
|
|
|
2018-01-25 - OilRig uses RGDoor IIS Backdoor on Targets in the Middle East.pdf
|
|
|
|
|
2018-01-25 - WannaMine Cryptomining- Harmless Nuisance or Disruptive Threat-.pdf
|
|
|
|
|
2018-01-26 - FriedEx- BitPaymer ransomware the work of Dridex authors.pdf
|
|
|
|
|
2018-01-26 - The TopHat Campaign- Attacks Within The Middle East Region Using Popular Third-Party Services.pdf
|
|
|
|
|
2018-01-26 - The Velso Ransomware Being Manually Installed by Attackers.pdf
|
|
|
|
|
2018-01-29 - GandCrab Ransomware Distributed by Exploit Kits Appends GDCB Extension.pdf
|
|
|
|
|
2018-01-29 - Let's Learn- Dissecting FormBook Infostealer Malware- Crypter & -RunLib.dll-.pdf
|
|
|
|
|
2018-01-29 - VERMIN- Quasar RAT and Custom Malware Used In Ukraine.pdf
|
|
|
|
|
2018-01-29 - Weekly TrickBot Analysis - End of w-c 22-Jan-2018 to 1000119.pdf
|
|
|
|
|
2018-01-30 - GandCrab ransomware distributed by RIG and GrandSoft exploit kits (updated).pdf
|
|
|
|
|
2018-01-31 - Smominru Monero mining botnet making millions for operators.pdf
|
|
|
|
|
2018-01-31 - What are “WannaMine” attacks, and how do I avoid them-.pdf
|
|
|
|
|
2018-02-01 - JenX – Los Calvos de San Calvicie.pdf
|
|
|
|
|
2018-02-01 - Operation PZChao- a possible return of the Iron Tiger APT.pdf
|
|
|
|
|
2018-02-01 - Quick Test Drive of Trickbot (It now has a Monero Module).pdf
|
|
|
|
|
2018-02-02 - Break Out Of The Tinynuke Malware.pdf
|
|
|
|
|
2018-02-02 - Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems.pdf
|
|
|
|
|
2018-02-02 - New Mac cryptominer distributed via a MacUpdate hack.pdf
|
|
|
|
|
2018-02-03 - Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and Recommendations.pdf
|
|
|
|
|
2018-02-04 - DorkBot- An Investigation.pdf
|
|
|
|
|
2018-02-04 - MALWARE ANALYSIS – PLUGX.pdf
|
|
|
|
|
2018-02-05 - Analyzing OSX-CreativeUpdater.pdf
|
|
|
|
|
2018-02-07 - Compromised Servers & Fraud Accounts- Recent Hancitor Attacks.pdf
|
|
|
|
|
2018-02-07 - RAT Trapped- LuminosityLink Falls Foul of Vermin Eradication Efforts.pdf
|
|
|
|
|
2018-02-07 - Targeted Attacks In The Middle East.pdf
|
|
|
|
|
2018-02-07 - Threat Spotlight- URSNIF Infostealer Malware.pdf
|
|
|
|
|
2018-02-08 - A review of the evolution of Andromeda over the years before we say goodbye.pdf
|
|
|
|
|
2018-02-08 - DarkSky Botnet.pdf
|
|
|
|
|
2018-02-08 - GandCrab Ransomware Being Distributed Via Malspam Disguised as Receipts.pdf
|
|
|
|
|
2018-02-08 - How not to use a driver to execute code with kernel privileges.pdf
|
|
|
|
|
2018-02-08 - MBRlock Ransomware.pdf
|
|
|
|
|
2018-02-08 - Meet CrowdStrike’s Adversary of the Month for February- MUMMY SPIDER.pdf
|
|
|
|
|
2018-02-08 - Merlin for Red Teams.pdf
|
|
|
|
|
2018-02-08 - ShurL0ckr Ransomware as a Service Peddled on Dark Web, can Reportedly Bypass Cloud Applications.pdf
|
|
|
|
|
2018-02-08 - UDPoS - exfiltrating credit card data via DNS.pdf
|
|
|
|
|
2018-02-09 - Black Ruby Ransomware Skips Victims in Iran and Adds a Miner for Good Measure.pdf
|
|
|
|
|
2018-02-09 - DexCrypt MBRLocker Demands 30 Yuan To Gain Access to Computer.pdf
|
|
|
|
|
2018-02-12 - Lazarus Resurfaces, Targets Global Banks and Bitcoin Users.pdf
|
|
|
|
|
2018-02-12 - New Satori Botnet Variant Enslaves Thousands of Dasan WiFi Routers.pdf
|
|
|
|
|
2018-02-12 - Olympic Destroyer Takes Aim At Winter Olympics.pdf
|
|
|
|
|
2018-02-13 - Lotus Blossom Continues ASEAN Targeting.pdf
|
|
|
|
|
2018-02-13 - Stopping Olympic Destroyer- New Process Injection Insights.pdf
|
|
|
|
|
2018-02-14 - Reversing Py2Exe binaries.pdf
|
|
|
|
|
2018-02-15 - Malspam delivers Keybase keylogger.pdf
|
|
|
|
|
2018-02-15 - Olympic Destroyer.pdf
|
|
|
|
|
2018-02-15 - SamSam Ransomware Campaigns.pdf
|
|
|
|
|
2018-02-15 - SamSam- Converting Opportunity into Profit.pdf
|
|
|
|
|
2018-02-15 - TrickBot’s Cryptocurrency Hunger- Tricking the Bitcoin Out of Wallets.pdf
|
|
|
|
|
2018-02-16 - New jRAT-Adwind Variant Being Spread With Package Delivery Scam.pdf
|
|
|
|
|
2018-02-17 - Tearing Apart the Undetected (OSX)Coldroot RAT.pdf
|
|
|
|
|
2018-02-20 - A Slice of 2017 Sofacy Activity.pdf
|
|
|
|
|
2018-02-20 - APT37 (Reaper)- The Overlooked North Korean Actor.pdf
|
|
|
|
|
2018-02-20 - Latest Elise APT comes packed with Sandbox Evasions.pdf
|
|
|
|
|
2018-02-21 - Avast tracks down Tempting Cedar Spyware.pdf
|
|
|
|
|
2018-02-21 - FinSpy VM Unpacking Tutorial Part 3- Devirtualization. Phase #1- Deobfuscating FinSpy VM Bytecode Programs.pdf
|
|
|
|
|
2018-02-21 - FinSpy VM Unpacking Tutorial Part 3- Devirtualization. Phase #2- First Attempt At Devirtualization.pdf
|
|
|
|
|
2018-02-21 - FinSpy VM Unpacking Tutorial Part 3- Devirtualization. Phase #3- Fixing The Function-Related Issues.pdf
|
|
|
|
|
2018-02-21 - FinSpy VM Unpacking Tutorial Part 3- Devirtualization. Phase #4- Second Attempt At Devirtualization.pdf
|
|
|
|
|
2018-02-21 - FinSpy VM Unpacking Tutorial Part 3- Devirtualization. Phase 1- Deobfuscating FinSpy VM Bytecode Programs.pdf
|
|
|
|
|
2018-02-21 - FinSpy VM Unpacking Tutorial Part 3- Devirtualization. Phase 2- First Attempt At Devirtualization.pdf
|
|
|
|
|
2018-02-21 - FinSpy VM Unpacking Tutorial Part 3- Devirtualization. Phase 3- Fixing The Function-Related Issues.pdf
|
|
|
|
|
2018-02-21 - FinSpy VM Unpacking Tutorial Part 3- Devirtualization. Phase 4- Second Attempt At Devirtualization.pdf
|
|
|
|
|
2018-02-21 - FinSpy VM Unpacking Tutorial Part 3- Devirtualization.pdf
|
|
|
|
|
2018-02-21 - FinSpyVM (Static Unpacker for FinSpyVM).pdf
|
|
|
|
|
2018-02-21 - Olympic Destroyer- A new Candidate in South Korea.pdf
|
|
|
|
|
2018-02-22 - Let's Learn- Deeper Dive into Ramnit Banker -VNC IFSB- Remote Control Module.pdf
|
|
|
|
|
2018-02-23 - Avzhan DDoS bot dropped by Chinese drive-by attack.pdf
|
|
|
|
|
2018-02-23 - OopsIE! OilRig Uses ThreeDollars to Deliver New Trojan.pdf
|
|
|
|
|
2018-02-26 - Analyzing the nasty .NET protection of the Ploutus.D malware.pdf
|
|
|
|
|
2018-02-26 - Anatomy of the Process Environment Block (PEB) (Windows Internals).pdf
|
|
|
|
|
2018-02-26 - Nanocore RAT Author Gets 33 Months in Prison.pdf
|
|
|
|
|
2018-02-26 - Thanatos Ransomware Is First to Use Bitcoin Cash Messes Up Encryption.pdf
|
|
|
|
|
2018-02-26 - Who Wasn’t Responsible for Olympic Destroyer-.pdf
|
|
|
|
|
2018-02-27 - Dissecting Hancitor’s Latest 2018 Packer.pdf
|
|
|
|
|
2018-02-28 - Black Ruby- Combining Ransomware and Coin Miner Malware.pdf
|
|
|
|
|
2018-02-28 - CannibalRAT targets Brazil.pdf
|
|
|
|
|
2018-02-28 - Chafer- Latest Attacks Reveal Heightened Ambitions.pdf
|
|
|
|
|
2018-02-28 - Sofacy Attacks Multiple Government Entities.pdf
|
|
|
|
|
2018-03-01 - A Quick Dip into MuddyWater's Recent Activity.pdf
|
|
|
|
|
2018-03-01 - Blast from the past- stowaway Virut delivered with Chinese DDoS bot.pdf
|
|
|
|
|
2018-03-01 - FinFisher exposed- A researcher’s tale of defeating traps, tricks, and complex virtual machines.pdf
|
|
|
|
|
2018-03-02 - Analysing Remcos RAT’s executable.pdf
|
|
|
|
|
2018-03-02 - McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups.pdf
|
|
|
|
|
2018-03-02 - Spear-phishing campaign leveraging on MSXSL.pdf
|
|
|
|
|
2018-03-02 - Tales of a Threat Hunter 2 Following the trace of WMI Backdoors & other nastiness.pdf
|
|
|
|
|
2018-03-05 - Sure, I’ll take that! New ComboJack Malware Alters Clipboards to Steal Cryptocurrency.pdf
|
|
|
|
|
2018-03-05 - Suricata rules to detect Winnti communication.pdf
|
|
|
|
|
2018-03-06 - Gozi ISFB Remains Active in 2018, Leverages -Dark Cloud- Botnet For Distribution.pdf
|
|
|
|
|
2018-03-07 - Leaked Ammyy Admin Source Code Turned into Malware.pdf
|
|
|
|
|
2018-03-07 - Patchwork Continues to Deliver BADNEWS to the Indian Subcontinent.pdf
|
|
|
|
|
2018-03-07 - Ransomware news- GlobeImposter gets a facelift, GandCrab is still out there.pdf
|
|
|
|
|
2018-03-08 - Donot Team Leverages New Modular Malware Framework in South Asia.pdf
|
|
|
|
|
2018-03-08 - Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant.pdf
|
|
|
|
|
2018-03-08 - New investigations into the CCleaner incident point to a possible third stage that had keylogger capacities.pdf
|
|
|
|
|
2018-03-08 - OlympicDestroyer is here to trick the industry.pdf
|
|
|
|
|
2018-03-08 - The devil’s in the Rich header.pdf
|
|
|
|
|
2018-03-09 - Cloning chip-and-PIN cards- Brazilian job.pdf
|
|
|
|
|
2018-03-09 - From Russia(-) with Code.pdf
|
|
|
|
|
2018-03-09 - Masha and these Bears - 2018 Sofacy Activity.pdf
|
|
|
|
|
2018-03-09 - New traces of Hacking Team in the wild.pdf
|
|
|
|
|
2018-03-09 - Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads-.pdf
|
|
|
|
|
2018-03-09 - The Slingshot APT FAQ.pdf
|
|
|
|
|
2018-03-10 - APT15 is alive and strong- An analysis of RoyalCli and RoyalDNS.pdf
|
|
|
|
|
2018-03-12 - A Study of RATs- Third Timeline Iteration.pdf
|
|
|
|
|
2018-03-12 - Campaign Possibly Connected to “MuddyWater” Surfaces in the Middle East and Central Asia.pdf
|
|
|
|
|
2018-03-12 - Python decryptor for newer AdWind config file.pdf
|
|
|
|
|
2018-03-13 - HenBox- The Chickens Come Home to Roost.pdf
|
|
|
|
|
2018-03-13 - Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign.pdf
|
|
|
|
|
2018-03-13 - New Variant of BankBot Banking Trojan Ups Ante, Cashes Out on Android Users.pdf
|
|
|
|
|
2018-03-13 - Time of death- A therapeutic postmortem of connected medicine.pdf
|
|
|
|
|
2018-03-14 - Hermes ransomware distributed to South Koreans via recent Flash zero-day.pdf
|
|
|
|
|
2018-03-14 - Inception Framework- Alive and Well, and Hiding Behind Proxies.pdf
|
|
|
|
|
2018-03-14 - New POS Malware PinkKite Takes Flight.pdf
|
|
|
|
|
2018-03-14 - Tropic Trooper’s New Strategy.pdf
|
|
|
|
|
2018-03-16 - Royal APT - APT15 Repository.pdf
|
|
|
|
|
2018-03-16 - Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries.pdf
|
|
|
|
|
2018-03-20 - Kaspersky's 'Slingshot' report burned an ISIS-focused intelligence operation.pdf
|
|
|
|
|
2018-03-20 - Rootkit Umbreon - Umreon - x86, ARM samples.pdf
|
|
|
|
|
2018-03-20 - TeleRAT- Another Android Trojan Leveraging Telegram’s Bot API to Target Iranian Users.pdf
|
|
|
|
|
2018-03-20 - Tweet on Unlock92 Ransomware.pdf
|
|
|
|
|
2018-03-21 - Fobos Malvertising Campaign Delivers Bunitu Proxy Trojan via RIG EK.pdf
|
|
|
|
|
2018-03-21 - GrayBird-Colony.pdf
|
|
|
|
|
2018-03-21 - TrickBot Banking Trojan Adapts with New Module.pdf
|
|
|
|
|
2018-03-22 - GhostMiner- Cryptomining Malware Goes Fileless.pdf
|
|
|
|
|
2018-03-22 - Glupteba is no longer part of Windigo.pdf
|
|
|
|
|
2018-03-23 - Nine Iranians Charged With Conducting Massive Cyber Theft Campaign on Behalf of the Islamic Revolutionary Guard Corps.pdf
|
|
|
|
|
2018-03-23 - Sanny malware delivery method updated in recently observed attacks..pdf
|
|
|
|
|
2018-03-23 - The AVCrypt Ransomware Tries To Uninstall Your AV Software.pdf
|
|
|
|
|
2018-03-25 - Let's Learn- Internals of Iranian-Based Threat Group -Chafer- Malware- Autoit and PowerShell Persistence.pdf
|
|
|
|
|
2018-03-26 - Silent Librarian- More to the Story of the Iranian Mabna Institute Indictment.pdf
|
|
|
|
|
2018-03-27 - Evolving Trickbot Adds Detection Evasion and Screen-Locking Features.pdf
|
|
|
|
|
2018-03-27 - Panda Banker Zeros in on Japanese Targets.pdf
|
|
|
|
|
2018-03-28 - An in-depth malware analysis of QuantLoader.pdf
|
|
|
|
|
2018-03-28 - Dissecting Olympic Destroyer – a walk-through.pdf
|
|
|
|
|
2018-03-28 - Multi-stage Powershell script (Brownies).pdf
|
|
|
|
|
2018-03-28 - Quick summary about the Port 8291 scan.pdf
|
|
|
|
|
2018-03-29 - ChessMaster Adds Updated Tools to Its Arsenal.pdf
|
|
|
|
|
2018-03-30 - BADFLICK is not so bad!.pdf
|
|
|
|
|
2018-03-30 - hajime_hashes.pdf
|
|
|
|
|
2018-03-30 - Reflow JavaScript Backdoor.pdf
|
|
|
|
|
2018-04-02 - Fake AV Investigation Unearths KevDroid, New Android Malware.pdf
|
|
|
|
|
2018-04-03 - Lazarus KillDisks Central American casino.pdf
|
|
|
|
|
2018-04-03 - Let's Learn- Trickbot Implements Network Collector Module Leveraging CMD, WMI & LDAP.pdf
|
|
|
|
|
2018-04-04 - Hostile state actors compromising UK organisations with focus on engineering and industrial control companies.pdf
|
|
|
|
|
2018-04-04 - Hunting down Dofoil with Windows Defender ATP.pdf
|
|
|
|
|
2018-04-04 - New MacOS Backdoor Linked to OceanLotus Found.pdf
|
|
|
|
|
2018-04-04 - Smoking Out the Rarog Cryptocurrency Mining Trojan.pdf
|
|
|
|
|
2018-04-05 - Analysis of New Agent Tesla Spyware Variant.pdf
|
|
|
|
|
2018-04-05 - Reaper Group’s Updated Mobile Arsenal.pdf
|
|
|
|
|
2018-04-05 - Silent Librarian University Attacks Continue Unabated in Days Following Indictment.pdf
|
|
|
|
|
2018-04-10 - IcedID Banking Trojan Teams up with Ursnif-Dreambot for Distribution.pdf
|
|
|
|
|
2018-04-10 - Maktub ransomware- possibly rebranded as Iron.pdf
|
|
|
|
|
2018-04-10 - schneiken.pdf
|
|
|
|
|
2018-04-10 - ‘FakeUpdates’ campaign leverages multiple website platforms.pdf
|
|
|
|
|
2018-04-12 - APT Trends report Q1 2018.pdf
|
|
|
|
|
2018-04-12 - Operation Parliament, who is doing what-.pdf
|
|
|
|
|
2018-04-13 - Let's Learn- In-Depth Dive into Gootkit Banker Version 4 Malware Analysis.pdf
|
|
|
|
|
2018-04-13 - RadRAT- An all-in-one toolkit for complex espionage ops.pdf
|
|
|
|
|
2018-04-13 - Say “Cheese”- WebMonitor RAT Comes with C2-as-a-Service (C2aaS).pdf
|
|
|
|
|
2018-04-15 - This is Spartacus- new ransomware on the block.pdf
|
|
|
|
|
2018-04-16 - Malware Analysis- New Trojan Double Dropper.pdf
|
|
|
|
|
2018-04-16 - RAT Gone Rogue- Meet ARS VBS Loader.pdf
|
|
|
|
|
2018-04-16 - Searching for the Reuse of Mirai Code- Hide ‘N Seek Bot.pdf
|
|
|
|
|
2018-04-16 - Smoke Loader malware improves after Microsoft spoils its Campaign.pdf
|
|
|
|
|
2018-04-16 - TrickBot & UACME.pdf
|
|
|
|
|
2018-04-17 - Decoding network data from a Gh0st RAT variant.pdf
|
|
|
|
|
2018-04-17 - Recent findings from CCleaner APT investigation reveal that attackers entered the Piriform network via TeamViewer.pdf
|
|
|
|
|
2018-04-17 - Reversing the Bandios - Colony Malware.pdf
|
|
|
|
|
2018-04-17 - SquirtDanger- The Swiss Army Knife Malware from Veteran Malware Author TheBottle.pdf
|
|
|
|
|
2018-04-18 - APT33.pdf
|
|
|
|
|
2018-04-18 - GOLD GALLEON- How a Nigerian Cyber Crew Plunders the Shipping Industry.pdf
|
|
|
|
|
2018-04-18 - Stresspaint Malware Campaign Targeting Facebook Credentials.pdf
|
|
|
|
|
2018-04-18 - Stresspaint Malware Steals Facebook Credentials and Session Cookies.pdf
|
|
|
|
|
2018-04-18 - Stresspaint Malware Targeting Facebook Credentials.pdf
|
|
|
|
|
2018-04-18 - Tens of thousands of Facebook accounts compromised in days by malware.pdf
|
|
|
|
|
2018-04-19 - XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing.pdf
|
|
|
|
|
2018-04-20 - Researchers Discover New variants of APT34 Malware.pdf
|
|
|
|
|
2018-04-20 - XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing.pdf
|
|
|
|
|
2018-04-22 - Satan ransomware adds EternalBlue exploit.pdf
|
|
|
|
|
2018-04-23 - Energetic Bear-Crouching Yeti- attacks on servers.pdf
|
|
|
|
|
2018-04-23 - Muhstik Botnet Exploits Highly Critical Drupal Bug.pdf
|
|
|
|
|
2018-04-23 - New Orangeworm attack group targets the healthcare sector in the U.S., Europe, and Asia.pdf
|
|
|
|
|
2018-04-24 - Analyzing Operation GhostSecret- Attack Seeks to Steal Data Worldwide.pdf
|
|
|
|
|
2018-04-24 - Metamorfo Campaigns Targeting Brazilian Users.pdf
|
|
|
|
|
2018-04-24 - New Crossrider variant installs configuration profiles on Macs.pdf
|
|
|
|
|
2018-04-24 - Sednit update- Analysis of Zebrocy.pdf
|
|
|
|
|
2018-04-26 - GravityRAT - The Two-Year Evolution Of An APT Targeting India.pdf
|
|
|
|
|
2018-04-26 - Necurs Evolves to Evade Spam Detection via Internet Shortcut File.pdf
|
|
|
|
|
2018-04-27 - GravityRAT malware takes your system's temperature.pdf
|
|
|
|
|
2018-04-27 - North Korean Hackers Are up to No Good Again.pdf
|
|
|
|
|
2018-05-01 - Legitimate Application AnyDesk Bundled with New Ransomware Variant.pdf
|
|
|
|
|
2018-05-01 - Lojack Becomes a Double-Agent.pdf
|
|
|
|
|
2018-05-03 - Who’s who in the Zoo.pdf
|
|
|
|
|
2018-05-04 - Botception with Necurs- Botnet distributes script with bot capabilities.pdf
|
|
|
|
|
2018-05-07 - EAST Publishes European Fraud Update 2-2018.pdf
|
|
|
|
|
2018-05-07 - Hide and Seek IoT Botnet resurfaces with new tricks, persistence.pdf
|
|
|
|
|
2018-05-07 - SynAck targeted ransomware uses the Doppelgänging technique.pdf
|
|
|
|
|
2018-05-08 - -Hide and Seek- Becomes First IoT Botnet Capable of Surviving Device Reboots.pdf
|
|
|
|
|
2018-05-08 - Clearing the MuddyWater - Analysis of new MuddyWater Samples.pdf
|
|
|
|
|
2018-05-08 - Russian hackers posed as IS to threaten military wives.pdf
|
|
|
|
|
2018-05-09 - Gandcrab Ransomware Walks its Way onto Compromised Sites.pdf
|
|
|
|
|
2018-05-09 - Malware Analysis - PlugX - Part 2.pdf
|
|
|
|
|
2018-05-09 - Panda Malware Broadens Targets to Cryptocurrency Exchanges and Social Media.pdf
|
|
|
|
|
2018-05-09 - The King is dead. Long live the King!.pdf
|
|
|
|
|
2018-05-10 - TreasureHunter Point-of-Sale Malware and Builder Source Code Leaked.pdf
|
|
|
|
|
2018-05-11 - Attackers Exploit DLL Hijacking to Bypass SmartScreen.pdf
|
|
|
|
|
2018-05-12 - MS Crypto Derive Functions.pdf
|
|
|
|
|
2018-05-12 - PRB-Backdoor - A Fully Loaded PowerShell Backdoor with Evil Intentions.pdf
|
|
|
|
|
2018-05-14 - A Deep Dive Into RIG Exploit Kit Delivering Grobios Trojan.pdf
|
|
|
|
|
2018-05-14 - StalinLocker Deletes Your Files Unless You Enter the Right Code.pdf
|
|
|
|
|
2018-05-15 - IR in Heterogeneous Environment.pdf
|
|
|
|
|
2018-05-15 - N40, the botnet created in Brazil which evolves to attack the Chilean banking sector.pdf
|
|
|
|
|
2018-05-15 - PAKISTAN- HUMAN RIGHTS UNDER SURVEILLANCE.pdf
|
|
|
|
|
2018-05-15 - Swedish sports body says anti-doping unit hit by hacking attack.pdf
|
|
|
|
|
2018-05-17 - A Wicked Family of Bots.pdf
|
|
|
|
|
2018-05-17 - Analyzing an AZORult Attack – Evasion in a Cloak of Multiple Layers.pdf
|
|
|
|
|
2018-05-17 - Gozi V3 Technical Update.pdf
|
|
|
|
|
2018-05-18 - Meet CrowdStrike’s Adversary of the Month for May- MYTHIC LEOPARD.pdf
|
|
|
|
|
2018-05-18 - Stealth Mango and Tangelo- Nation state mobile surveillanceware stealing data from military & government officials.pdf
|
|
|
|
|
2018-05-19 - Malicious Powershell Targeting UK Bank Customers.pdf
|
|
|
|
|
2018-05-21 - An In-Depth Analysis of Samsam Ransomware and BOSS SPIDER.pdf
|
|
|
|
|
2018-05-21 - Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 1.pdf
|
|
|
|
|
2018-05-21 - Tiny SHell.pdf
|
|
|
|
|
2018-05-22 - Nmap Script to scan for Winnti infections.pdf
|
|
|
|
|
2018-05-22 - The destruction of APT3.pdf
|
|
|
|
|
2018-05-22 - Turla Mosquito- A shift towards more generic tools.pdf
|
|
|
|
|
2018-05-23 - Justice Department Announces Actions to Disrupt Advanced Persistent Threat 28 Botnet of Infected Routers and Network Storage Devices.pdf
|
|
|
|
|
2018-05-23 - New VPNFilter malware targets at least 500K networking devices worldwide.pdf
|
|
|
|
|
2018-05-23 - VPNFilter- New Router Malware with Destructive Capabilities.pdf
|
|
|
|
|
2018-05-24 - JavaScript based Bot using Github C&C.pdf
|
|
|
|
|
2018-05-24 - Phorpiex – A decade of spamming from the shadows.pdf
|
|
|
|
|
2018-05-24 - VPNFilter EXIF to C2 mechanism analysed.pdf
|
|
|
|
|
2018-05-25 - Analysis of CVE-2018-8174 VBScript 0day and APT actor related to Office targeted attack.pdf
|
|
|
|
|
2018-05-25 - BackSwap malware finds innovative ways to empty bank accounts.pdf
|
|
|
|
|
2018-05-28 - BackNet.pdf
|
|
|
|
|
2018-05-29 - Alert (TA18-149A)- HIDDEN COBRA – Joanap Backdoor Trojan and Brambul Server Message Block Worm.pdf
|
|
|
|
|
2018-05-29 - Cobalt Renaissance- new attacks and joint operations.pdf
|
|
|
|
|
2018-05-29 - Iron Cybercrime Group Under The Scope.pdf
|
|
|
|
|
2018-05-29 - MAR-10135536-3 - HIDDEN COBRA RAT-Worm.pdf
|
|
|
|
|
2018-05-29 - Mexico Foiled a $110 Million Bank Heist, Then Kept It a Secret.pdf
|
|
|
|
|
2018-05-30 - Thief in the night- New Nocturnal Stealer grabs data on the cheap.pdf
|
|
|
|
|
2018-05-31 - APT28 Rollercoaster- The Lowdown on Hijacked Lo.pdf
|
|
|
|
|
2018-05-31 - DanaBot - A new banking Trojan surfaces Down Under.pdf
|
|
|
|
|
2018-05-31 - NavRAT Uses US-North Korea Summit As Decoy For Attacks In South Korea.pdf
|
|
|
|
|
2018-06-01 - MysteryBot - A New Android Banking Trojan Ready For Android 7 and 8.pdf
|
|
|
|
|
2018-06-01 - Satan Ransomware Spawns New Methods to Spread.pdf
|
|
|
|
|
2018-06-05 - The Evolution of GandCrab Ransomware.pdf
|
|
|
|
|
2018-06-06 - Banking Trojans Under Development.pdf
|
|
|
|
|
2018-06-06 - Operation Prowli- Monetizing 40,000 Victim Machines.pdf
|
|
|
|
|
2018-06-06 - Sofacy Group’s Parallel Attacks.pdf
|
|
|
|
|
2018-06-06 - VPNFilter Update - VPNFilter exploits endpoints, targets new devices.pdf
|
|
|
|
|
2018-06-07 - InvisiMole- Surprisingly equipped spyware, undercover since 2013.pdf
|
|
|
|
|
2018-06-07 - New KillDisk Variant Hits Latin American Financial Organizations Again.pdf
|
|
|
|
|
2018-06-07 - Patchwork APT Group Targets US Think Tanks.pdf
|
|
|
|
|
2018-06-12 - Deep Dive into UPAS Kit vs. Kronos.pdf
|
|
|
|
|
2018-06-12 - Trik Spam Botnet Leaks 43 Million Email Addresses.pdf
|
|
|
|
|
2018-06-13 - Banco de Chile Wiper Attack Just a Cover for $10M SWIFT Heist.pdf
|
|
|
|
|
2018-06-13 - DDG.Mining.Botnet 近期活动分析.pdf
|
|
|
|
|
2018-06-13 - Lateral Movement Technique Employed by Hidden Cobra.pdf
|
|
|
|
|
2018-06-13 - LuckyMouse hits national data center to organize country-level waterholing campaign.pdf
|
|
|
|
|
2018-06-13 - TrickBot config files.pdf
|
|
|
|
|
2018-06-14 - Another Potential MuddyWater Campaign uses Powershell-based PRB-Backdoor.pdf
|
|
|
|
|
2018-06-14 - DBGer Ransomware Uses EternalBlue and Mimikatz to Spread Across Networks.pdf
|
|
|
|
|
2018-06-15 - Betabot still alive with multi-stage packing.pdf
|
|
|
|
|
2018-06-15 - Chinese Cyber-Espionage Group Hacked Government Data Center.pdf
|
|
|
|
|
2018-06-15 - Hacker Breaches Syscoin GitHub Account and Poisons Official Client.pdf
|
|
|
|
|
2018-06-15 - Meet CrowdStrike’s Adversary of the Month for June- MUSTANG PANDA.pdf
|
|
|
|
|
2018-06-17 - Storwize USB Initialization Tool may contain malicious code.pdf
|
|
|
|
|
2018-06-18 - Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 2.pdf
|
|
|
|
|
2018-06-18 - Joshua Adam Schulte Charged with the Unauthorized Disclosure of Classified Information and Other Offenses Relating to the Theft of Classified Material from the Central Intelligence Agency.pdf
|
|
|
|
|
2018-06-18 - New Telegram‑abusing Android RAT discovered in the wild.pdf
|
|
|
|
|
2018-06-19 - -Hidden Bee- strikes- Kingsoft Internet Security intercepts the world's first Bootkit-class mining botnet.pdf
|
|
|
|
|
2018-06-19 - Backswap malware analysis.pdf
|
|
|
|
|
2018-06-19 - FakeSpy Android Information-Stealing Malware Targets Japanese and Korean-Speaking Users.pdf
|
|
|
|
|
2018-06-19 - FakeSpy Targets Japanese and Korean-Speaking Users.pdf
|
|
|
|
|
2018-06-19 - Hades, the actor behind Olympic Destroyer is still alive.pdf
|
|
|
|
|
2018-06-19 - Kardon Loader Looks for Beta Testers.pdf
|
|
|
|
|
2018-06-19 - Thrip- Espionage Group Hits Satellite, Telecoms, and Defense Companies.pdf
|
|
|
|
|
2018-06-20 - Meet MyloBot – A New Highly Sophisticated Never-Seen-Before Botnet That’s Out In The Wild.pdf
|
|
|
|
|
2018-06-20 - My Little FormBook.pdf
|
|
|
|
|
2018-06-23 - Full Discloser of Andariel, A Subgroup of Lazarus Threat Group.pdf
|
|
|
|
|
2018-06-23 - Malware Analysis- Kardon Loader.pdf
|
|
|
|
|
2018-06-26 - Files Cannot Be Decrypted- Challenge Accepted. Talos Releases ThanatosDecryptor.pdf
|
|
|
|
|
2018-06-26 - RANCOR- Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families.pdf
|
|
|
|
|
2018-06-26 - Thanatos Ransomware Decryptor Released by the Cisco Talos Group.pdf
|
|
|
|
|
2018-06-28 - A Brief Overview of the AMMYY RAT Downloader.pdf
|
|
|
|
|
2018-06-28 - The New Face of Necurs- Noteworthy Changes to Necurs’ Behaviors.pdf
|
|
|
|
|
2018-06-29 - BackSwap Defrauds Online Banking Customers Using Hidden Input Fields.pdf
|
|
|
|
|
2018-06-29 - OSX.Dummy.pdf
|
|
|
|
|
2018-06-29 - Recent LiteHTTP activities and IOCs.pdf
|
|
|
|
|
2018-06-29 - Where we go, we don't need files- Analysis of fileless malware -Rozena-.pdf
|
|
|
|
|
2018-07-03 - Hamas Cyber Ops Spied on Hundreds of Israeli Soldiers Using Fake World Cup, Dating Apps.pdf
|
|
|
|
|
2018-07-03 - Iranian APT Charming Kitten impersonates ClearSky, the security firm that uncovered its campaigns.pdf
|
|
|
|
|
2018-07-03 - Smoking Guns - Smoke Loader learned new tricks.pdf
|
|
|
|
|
2018-07-05 - A Look At Recent Tinba Banking Trojan Variant.pdf
|
|
|
|
|
2018-07-05 - To crypt, or to mine – that is the question.pdf
|
|
|
|
|
2018-07-06 - BI_D Ransomware.pdf
|
|
|
|
|
2018-07-06 - HNS Botnet Recent Activities.pdf
|
|
|
|
|
2018-07-06 - HNS Evolves From IoT to Cross-Platform Botnet.pdf
|
|
|
|
|
2018-07-06 - Malware “WellMess” Targeting Linux and Windows.pdf
|
|
|
|
|
2018-07-08 - APT Attack In the Middle East- The Big Bang.pdf
|
|
|
|
|
2018-07-08 - Hussarini – Targeted Cyber Attack in the Philippines.pdf
|
|
|
|
|
2018-07-09 - Certificates stolen from Taiwanese tech‑companies misused in Plead malware campaign.pdf
|
|
|
|
|
2018-07-10 - APT Trends Report Q2 2018.pdf
|
|
|
|
|
2018-07-11 - Chinese Espionage Group TEMP.Periscope Targets Cambodia Ahead of July 2018 Elections and Reveals Broad Operations Globally.pdf
|
|
|
|
|
2018-07-11 - Hawkeye Keylogger – Reborn v8- An in-depth campaign analysis.pdf
|
|
|
|
|
2018-07-11 - NotCarbanak Mystery - Source Code Leak.pdf
|
|
|
|
|
2018-07-11 - Tackling Gootkit's Traps.pdf
|
|
|
|
|
2018-07-12 - Old Botnets never Die, and DDG REFUSE to Fade Away.pdf
|
|
|
|
|
2018-07-13 - Upatre Continued to Evolve with new Anti-Analysis Techniques.pdf
|
|
|
|
|
2018-07-13 - VPNFilter-affected Devices Still Riddled with 19 Vulnerabilities.pdf
|
|
|
|
|
2018-07-16 - APT Sidewinder- Tricks powershell, Anti Forensics and execution side loading.pdf
|
|
|
|
|
2018-07-16 - Author of LuminosityLink Pleads Guilty.pdf
|
|
|
|
|
2018-07-16 - DanaBot Riding Fake MYOB Invoice Emails.pdf
|
|
|
|
|
2018-07-16 - Magniber ransomware improves, expands within Asia.pdf
|
|
|
|
|
2018-07-16 - New Andariel Reconnaissance Tactics Uncovered.pdf
|
|
|
|
|
2018-07-17 - A deep dive down the Vermin RAThole.pdf
|
|
|
|
|
2018-07-17 - Blackgear Cyberespionage Campaign Resurfaces, Abuses Social Media for C&C Communication.pdf
|
|
|
|
|
2018-07-17 - The return of Fantomas, or how we deciphered Cryakl.pdf
|
|
|
|
|
2018-07-17 - Who was behind this unprecedented Cyber attack on Western infrastructure-.pdf
|
|
|
|
|
2018-07-18 - Dissecting Smoke Loader.pdf
|
|
|
|
|
2018-07-18 - GandCrab v4.1.2 Encryption Blocking Method (Kill Switch).pdf
|
|
|
|
|
2018-07-18 - The Evolution of Emotet- From Banking Trojan to Threat Distributor.pdf
|
|
|
|
|
2018-07-19 - Killswitch File Now Available for GandCrab v4.1.2 Ransomware.pdf
|
|
|
|
|
2018-07-19 - Router Crapfest- Malware Author Builds 18,000-Strong Botnet in a Day.pdf
|
|
|
|
|
2018-07-19 - TA505 Abusing SettingContent-ms within PDF files to Distribute FlawedAmmyy RAT.pdf
|
|
|
|
|
2018-07-20 - Alert (TA18-201A) Emotet Malware.pdf
|
|
|
|
|
2018-07-20 - Calisto Trojan for macOS.pdf
|
|
|
|
|
2018-07-20 - Cyberattack on Singapore health database steals details of 1.5 million, including PM.pdf
|
|
|
|
|
2018-07-20 - Unit 42 Finds New Mirai and Gafgyt IoT-Linux Botnet Campaigns.pdf
|
|
|
|
|
2018-07-23 - Deobfuscating Emotet’s powershell payload.pdf
|
|
|
|
|
2018-07-23 - Source Code for Exobot Android Banking Trojan Leaked Online.pdf
|
|
|
|
|
2018-07-24 - Emotet- The Tricky Trojan that ‘Git Clones’.pdf
|
|
|
|
|
2018-07-24 - Kronos Reborn.pdf
|
|
|
|
|
2018-07-25 - Leafminer- New Espionage Campaigns Targeting Middle Eastern Regions.pdf
|
|
|
|
|
2018-07-25 - OilRig Targets Technology Service Provider and Government Agency with QUADAGENT.pdf
|
|
|
|
|
2018-07-25 - Parasite HTTP RAT cooks up a stew of stealthy tricks.pdf
|
|
|
|
|
2018-07-26 - Meet CrowdStrike’s Adversary of the Month for July- WICKED SPIDER.pdf
|
|
|
|
|
2018-07-26 - Mitigating Emotet, The Most Common Banking Trojan.pdf
|
|
|
|
|
2018-07-26 - ‘Hidden Bee’ miner delivered via improved drive-by download toolkit.pdf
|
|
|
|
|
2018-07-27 - Luoxk Malware – Exploiting CVE-2018-2893.pdf
|
|
|
|
|
2018-07-27 - New Threat Actor Group DarkHydrus Targets Middle East Government.pdf
|
|
|
|
|
2018-07-28 - New Underminer Exploit Kit Discovered Pushing Bootkits and CoinMiners.pdf
|
|
|
|
|
2018-07-29 - AdKoob information thief targets Facebook ad purchase info.pdf
|
|
|
|
|
2018-07-29 - Let's Learn- In-Depth Reversing of Qakbot -qbot- Banker Part 1.pdf
|
|
|
|
|
2018-07-30 - New version of AZORult stealer improves loading features, spreads alongside ransomware in new campaign.pdf
|
|
|
|
|
2018-07-30 - Who is Mr Zheng-.pdf
|
|
|
|
|
2018-07-31 - Bisonal Malware Used in Attacks Against Russia and South Korea.pdf
|
|
|
|
|
2018-07-31 - Malicious document targets Vietnamese officials.pdf
|
|
|
|
|
2018-07-31 - Multiple Cobalt Personality Disorder.pdf
|
|
|
|
|
2018-07-31 - SamSam guide to coverage.pdf
|
|
|
|
|
2018-07-31 - SamSam- The (almost) $6 million ransomware.pdf
|
|
|
|
|
2018-07-31 - Scanner for CobaltStrike.pdf
|
|
|
|
|
2018-07-31 - Sophos releases SamSam ransomware report.pdf
|
|
|
|
|
2018-08-01 - Arrests Put New Focus on CARBON SPIDER Adversary Group.pdf
|
|
|
|
|
2018-08-01 - Inside Look at Emotet's Global Victims and Malspam Qakbot Payloads.pdf
|
|
|
|
|
2018-08-01 - On the Hunt for FIN7- Pursuing an Enigmatic and Evasive Global Criminal Operation.pdf
|
|
|
|
|
2018-08-01 - Threat Alert- DDG 3013 is Out.pdf
|
|
|
|
|
2018-08-02 - Goblin Panda against the Bears.pdf
|
|
|
|
|
2018-08-02 - How to defend yourself against SamSam ransomware.pdf
|
|
|
|
|
2018-08-02 - Raspite.pdf
|
|
|
|
|
2018-08-02 - The Gorgon Group- Slithering Between Nation State and Cybercrime.pdf
|
|
|
|
|
2018-08-02 - Three Carbanak cyber heist gang members arrested.pdf
|
|
|
|
|
2018-08-02 - Who is Mr Gao-.pdf
|
|
|
|
|
2018-08-03 - CERT-FR ALERT BULLETIN.pdf
|
|
|
|
|
2018-08-03 - Volatility Plugin for Detecting Cobalt Strike Beacon.pdf
|
|
|
|
|
2018-08-05 - Let's Learn- Diving into the Latest -Ramnit- Banker Malware via -sLoad- PowerShell.pdf
|
|
|
|
|
2018-08-05 - Ramnit’s Network of Proxy Servers.pdf
|
|
|
|
|
2018-08-06 - Reversing Cerber - RaaS.pdf
|
|
|
|
|
2018-08-06 - Who is Mr Zhang-.pdf
|
|
|
|
|
2018-08-07 - DarkHydrus Uses Phishery to Harvest Credentials in the Middle East.pdf
|
|
|
|
|
2018-08-07 - Doctor Web discovered a clipper Trojan for Android.pdf
|
|
|
|
|
2018-08-08 - Export JRAT-Adwind Config with x32dbg.pdf
|
|
|
|
|
2018-08-09 - Bokbot- The (re)birth of a banker.pdf
|
|
|
|
|
2018-08-09 - Malware Analysis Report (AR18-221A).pdf
|
|
|
|
|
2018-08-09 - More on Huaying Haitai and Laoying Baichaun, the companies associated with APT10. Is there a state connection-.pdf
|
|
|
|
|
2018-08-13 - KeyPass ransomware.pdf
|
|
|
|
|
2018-08-15 - APT10 was managed by the Tianjin bureau of the Chinese Ministry of State Security.pdf
|
|
|
|
|
2018-08-15 - Necurs Targeting Banks with PUB File that Drops FlawedAmmyy.pdf
|
|
|
|
|
2018-08-16 - Chinese Cyberespionage Originating From Tsinghua University Infrastructure.pdf
|
|
|
|
|
2018-08-16 - New modular downloaders fingerprint systems, prepare for more - Part 1- Marap.pdf
|
|
|
|
|
2018-08-17 - EvilOSX.pdf
|
|
|
|
|
2018-08-17 - Prince of Persia- The Sands of Foudre.pdf
|
|
|
|
|
2018-08-18 - AZORult Trojan Serving Aurora Ransomware by MalActor Oktropys.pdf
|
|
|
|
|
2018-08-20 - Advanced Brazilian Malware Analysis.pdf
|
|
|
|
|
2018-08-20 - Interesting hidden threat since years -.pdf
|
|
|
|
|
2018-08-20 - Let's Learn- Dissecting Panda Banker & Modules- Webinject, Grabber & Keylogger DLL Modules.pdf
|
|
|
|
|
2018-08-20 - Ryuk Ransomware- A Targeted Campaign Break-Down.pdf
|
|
|
|
|
2018-08-20 - We are taking new steps against broadening threats to democracy.pdf
|
|
|
|
|
2018-08-21 - Dark Tequila Añejo.pdf
|
|
|
|
|
2018-08-21 - Microsoft claims win over 'Russian political hackers'.pdf
|
|
|
|
|
2018-08-21 - Microsoft Disrupts APT28 Hacking Campaign Aimed at US Midterm Elections.pdf
|
|
|
|
|
2018-08-21 - Operation Red Signature Targets South Korean Companies.pdf
|
|
|
|
|
2018-08-21 - Supply Chain Attack Operation Red Signature Targets South Korean Organizations.pdf
|
|
|
|
|
2018-08-22 - BackSwap Malware Now Targets Six Banks in Spain.pdf
|
|
|
|
|
2018-08-22 - Picking Apart Remcos Botnet-In-A-Box.pdf
|
|
|
|
|
2018-08-22 - The Untold Story of NotPetya, the Most Devastating Cyberattack in History.pdf
|
|
|
|
|
2018-08-22 - Turla Outlook Backdoor Uses Clever Tactics for Stealth and Persistence.pdf
|
|
|
|
|
2018-08-23 - Lazarus Group Deploys Its First Mac Malware in Cryptocurrency Exchange Hack.pdf
|
|
|
|
|
2018-08-23 - New modular downloaders fingerprint systems - Part 2- AdvisorsBot.pdf
|
|
|
|
|
2018-08-23 - Operation AppleJeus- Lazarus hits cryptocurrency exchange with fake installer and macOS malware.pdf
|
|
|
|
|
2018-08-24 - Back to School- COBALT DICKENS Targets Universities.pdf
|
|
|
|
|
2018-08-24 - Cobalt Dickens threat group looks to be similar to indicted hackers.pdf
|
|
|
|
|
2018-08-24 - Iranian Hackers Charged in March Are Still Actively Phishing Universities.pdf
|
|
|
|
|
2018-08-25 - Let's Learn- In-Depth Reversing of Recent Gozi ISFB Banking Malware Version 2.16-2.17 (portion of ISFB v3) & -loader.dll-client.dll-.pdf
|
|
|
|
|
2018-08-26 - Remember Fancy Bear-.pdf
|
|
|
|
|
2018-08-27 - Lime-Miner.pdf
|
|
|
|
|
2018-08-27 - North Korean Hacking Group Steals $13.5 Million From Indian Bank.pdf
|
|
|
|
|
2018-08-28 - The rise of mobile banker Asacub.pdf
|
|
|
|
|
2018-08-29 - Bahamut, Confucius and Patchwork Connected to Urpage.pdf
|
|
|
|
|
2018-08-29 - BusyGasper – the unfriendly spy.pdf
|
|
|
|
|
2018-08-29 - Loki Bot- On a hunt for corporate passwords.pdf
|
|
|
|
|
2018-08-29 - Meet CrowdStrike’s Adversary of the Month for August- GOBLIN PANDA.pdf
|
|
|
|
|
2018-08-29 - The Urpage Connection to Bahamut, Confucius and Patchwork.pdf
|
|
|
|
|
2018-08-30 - Cobalt Hacking Group Tests Banks In Russia and Romania.pdf
|
|
|
|
|
2018-08-30 - Double the Infection, Double the Fun.pdf
|
|
|
|
|
2018-08-30 - GlobeImposter which has more than 20 variants, is still wildly growing.pdf
|
|
|
|
|
2018-08-30 - Hackers Are Exposing An Apple Mac Weakness In Middle East Espionage.pdf
|
|
|
|
|
2018-08-30 - Manually unpacking Anubis APK.pdf
|
|
|
|
|
2018-08-30 - Reversing malware in a custom format- Hidden Bee elements.pdf
|
|
|
|
|
2018-08-30 - Rocke- The Champion of Monero Miners.pdf
|
|
|
|
|
2018-08-30 - Two Birds, One STONE PANDA.pdf
|
|
|
|
|
2018-08-31 - Who is Mr An, and was he working for APT10-.pdf
|
|
|
|
|
2018-09-02 - Alleged ‘Satori’ IoT Botnet Operator Sought Media Spotlight, Got Indicted.pdf
|
|
|
|
|
2018-09-02 - Weekend Project- A Custom IDA Loader Module For The Hidden Bee Malware Family.pdf
|
|
|
|
|
2018-09-03 - .lockymap Files Virus (PyLocky Ransomware) – Remove and Restore Data.pdf
|
|
|
|
|
2018-09-04 - CamuBot- New Financial Malware Targets Brazilian Banking Customers.pdf
|
|
|
|
|
2018-09-05 - New Silence hacking group suspected of having ties to cyber-security industry.pdf
|
|
|
|
|
2018-09-05 - PowerPool malware exploits ALPC LPE zero‑day vulnerability.pdf
|
|
|
|
|
2018-09-05 - Silence- Moving into the Darkside.pdf
|
|
|
|
|
2018-09-05 - Windows Task Scheduler Zero Day Exploited by Malware.pdf
|
|
|
|
|
2018-09-06 - Dissecting DEloader malware with obfuscation.pdf
|
|
|
|
|
2018-09-06 - North Korean Regime-Backed Programmer Charged With Conspiracy to Conduct Multiple Cyber Attacks and Intrusions.pdf
|
|
|
|
|
2018-09-06 - Slicing and Dicing CVE-2018-5002 Payloads- New CHAINSHOT Malware.pdf
|
|
|
|
|
2018-09-07 - Domestic Kitten APT Operates in Silence Since 2016.pdf
|
|
|
|
|
2018-09-07 - Let's Learn- Deeper Dive into -IcedID---BokBot- Banking Malware- Part 1.pdf
|
|
|
|
|
2018-09-09 - Multi-exploit IoT-Linux Botnets Mirai and Gafgyt Target Apache Struts, SonicWall.pdf
|
|
|
|
|
2018-09-10 - A Closer Look at the Locky Poser, PyLocky Ransomware.pdf
|
|
|
|
|
2018-09-10 - Android Malware Intercepts SMS 2FA- We have the Logs.pdf
|
|
|
|
|
2018-09-10 - IBM X-Force Delves Into ExoBot’s Leaked Source Code.pdf
|
|
|
|
|
2018-09-10 - LuckyMouse signs malicious NDISProxy driver with certificate of Chinese IT company.pdf
|
|
|
|
|
2018-09-11 - British Airways Fell Victim To Card Scraping Attack.pdf
|
|
|
|
|
2018-09-11 - New modular downloaders fingerprint systems - Part 3- CobInt.pdf
|
|
|
|
|
2018-09-11 - The Rise of Targeted Ransomware.pdf
|
|
|
|
|
2018-09-12 - Emotet IOC.pdf
|
|
|
|
|
2018-09-12 - Feedify Hacked with Magecart Information Stealing Script.pdf
|
|
|
|
|
2018-09-12 - Malware Campaign Targeting Jaxx Cryptocurrency Wallet Users Shut Down.pdf
|
|
|
|
|
2018-09-12 - OilRig Uses Updated BONDUPDATER to Target Middle Eastern Government.pdf
|
|
|
|
|
2018-09-13 - APT10 Targeting Japanese Corporations Using Updated TTPs.pdf
|
|
|
|
|
2018-09-14 - Kraken Cryptor Ransomware Masquerading as SuperAntiSpyware Security Program.pdf
|
|
|
|
|
2018-09-14 - Rektware Ransomware.pdf
|
|
|
|
|
2018-09-14 - Tunneling Under the Sands.pdf
|
|
|
|
|
2018-09-14 - Wannamine cryptominer that uses EternalBlue still active.pdf
|
|
|
|
|
2018-09-17 - Xbash Combines Botnet, Ransomware, Coinmining in Worm that Targets Linux and Windows.pdf
|
|
|
|
|
2018-09-18 - A taste of our own medicine- How SmokeLoader is deceiving configuration extraction by using binary code as bait.pdf
|
|
|
|
|
2018-09-18 - Fallout Exploit Kit Used in Malvertising Campaign to Deliver GandCrab Ransomware.pdf
|
|
|
|
|
2018-09-18 - Hide and Seek- Tracking NSO Group’s Pegasus Spyware to Operations in 45 Countries.pdf
|
|
|
|
|
2018-09-18 - Magecart Skimming Attack Targets Mobile Users of Hotel Chain Booking Websites.pdf
|
|
|
|
|
2018-09-19 - Hex-Rays Microcode API vs. Obfuscating Compiler.pdf
|
|
|
|
|
2018-09-19 - 绿斑”行动——持续多年的攻击.pdf
|
|
|
|
|
2018-09-20 - On the Trail of OSX.FairyTale - Adware Playing at Malware.pdf
|
|
|
|
|
2018-09-20 - Sustes Malware- CPU for Monero.pdf
|
|
|
|
|
2018-09-21 - DanaBot shifts its targeting to Europe, adds new features.pdf
|
|
|
|
|
2018-09-21 - VIGILANTE MALWARE REMOVES CRYPTOMINERS FROM THE INFECTED DEVICE.pdf
|
|
|
|
|
2018-09-24 - Adwind Dodges AV via DDE.pdf
|
|
|
|
|
2018-09-26 - VPNFilter III- More Tools for the Swiss Army Knife of Malware.pdf
|
|
|
|
|
2018-09-27 - APT28 Uses LoJax, First UEFI Rootkit Seen in the Wild.pdf
|
|
|
|
|
2018-09-27 - Cybercriminals Increasingly Trying to Ensnare the Big Financial Fish.pdf
|
|
|
|
|
2018-09-27 - LoJax- First UEFI rootkit found in the wild, courtesy of the Sednit group.pdf
|
|
|
|
|
2018-09-27 - New KONNI Malware attacking Eurasia and Southeast Asia.pdf
|
|
|
|
|
2018-09-27 - Torii botnet - Not another Mirai variant.pdf
|
|
|
|
|
2018-09-28 - Meet CrowdStrike’s Adversary of the Month for September- COBALT SPIDER.pdf
|
|
|
|
|
2018-10-01 - BianLian - The Malware Dropper That Had A Dream.pdf
|
|
|
|
|
2018-10-01 - CDS 2018 - Unmasking APT X.pdf
|
|
|
|
|
2018-10-01 - NOKKI Almost Ties the Knot with DOGCALL- Reaper Group Uses New Malware to Deploy RAT.pdf
|
|
|
|
|
2018-10-01 - Report Ties North Korean Attacks to New Malware, Linked by Word Macros.pdf
|
|
|
|
|
2018-10-01 - Roaming Mantis Group Testing Coinhive Miner Redirects on iPhones.pdf
|
|
|
|
|
2018-10-01 - VB2018 - Who Was Not Responsible for Olympic Destroyer.pdf
|
|
|
|
|
2018-10-02 - Alert (TA18-275A) HIDDEN COBRA- FASTCash Campaign.pdf
|
|
|
|
|
2018-10-02 - Alert (TA18-275A)- HIDDEN COBRA – FASTCash Campaign.pdf
|
|
|
|
|
2018-10-02 - DanaBot Gains Popularity and Targets US Organizations in Large Campaigns.pdf
|
|
|
|
|
2018-10-03 - APT37- Final1stspy Reaping the FreeMilk.pdf
|
|
|
|
|
2018-10-03 - New Betabot campaign under the microscope.pdf
|
|
|
|
|
2018-10-04 - APT28- New Espionage Operations Target Military and Government Organizations.pdf
|
|
|
|
|
2018-10-04 - Indicators of Compromise for Malware used by APT28.pdf
|
|
|
|
|
2018-10-04 - Nomadic Octopus- cyber espionage in Central Asia.pdf
|
|
|
|
|
2018-10-04 - Shedding Skin – Turla’s Fresh Faces.pdf
|
|
|
|
|
2018-10-05 - ARS Loader evolution, a new stealer (ZeroEvil) and AirNaine (TA545).pdf
|
|
|
|
|
2018-10-08 - BSides Belfast 2018- Lazarus On The Rise- Insights From SWIFT Bank Attacks.pdf
|
|
|
|
|
2018-10-08 - Cobalt Group 2.0.pdf
|
|
|
|
|
2018-10-08 - Delivery (Key)Boy.pdf
|
|
|
|
|
2018-10-09 - Magecart Group Compromises Plugin Used in Thousands of Stores, Makes Rookie Mistake.pdf
|
|
|
|
|
2018-10-09 - Malware Configs - Pandabanker.pdf
|
|
|
|
|
2018-10-10 - Gallmaker- New Attack Group Eschews Malware to Live off the Land.pdf
|
|
|
|
|
2018-10-10 - MuddyWater expands operations.pdf
|
|
|
|
|
2018-10-11 - GPlayed Trojan - .Net playing with Google Market.pdf
|
|
|
|
|
2018-10-11 - New TeleBots backdoor- First evidence linking Industroyer to NotPetya.pdf
|
|
|
|
|
2018-10-14 - Godzilla Loader and the Long Tail of Malware.pdf
|
|
|
|
|
2018-10-15 - Octopus-infested seas of Central Asia.pdf
|
|
|
|
|
2018-10-15 - Predator The Thief- In-depth analysis (v2.3.5).pdf
|
|
|
|
|
2018-10-17 - ESET unmasks ‘GREYENERGY’ cyber-espionage group.pdf
|
|
|
|
|
2018-10-17 - GreyEnergy- Updated arsenal of one of the most dangerous threat actors.pdf
|
|
|
|
|
2018-10-17 - Software Description- More_eggs.pdf
|
|
|
|
|
2018-10-17 - The Emergence of the New Azorult 3.3.pdf
|
|
|
|
|
2018-10-17 - Thrip.pdf
|
|
|
|
|
2018-10-17 - ‘Operation Oceansalt’ Delivers Wave After Wave.pdf
|
|
|
|
|
2018-10-19 - DarkPulsar.pdf
|
|
|
|
|
2018-10-22 - Chalubo botnet wants to DDoS from your server or IoT device.pdf
|
|
|
|
|
2018-10-22 - Mobile beasts and where to find them — part four.pdf
|
|
|
|
|
2018-10-23 - godoh- A DNS-over-HTTPS Command & Control Proof of Concept.pdf
|
|
|
|
|
2018-10-23 - sLoad and Ramnit pairing in sustained campaigns against UK and Italy.pdf
|
|
|
|
|
2018-10-23 - TRITON Attribution- Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers.pdf
|
|
|
|
|
2018-10-24 - Waiting for goDoH.pdf
|
|
|
|
|
2018-10-25 - Cutwail Spam Campaign Uses Steganography to Distribute URLZone.pdf
|
|
|
|
|
2018-10-25 - Game of Trojans- Dissecting the Khalesi Infostealer Malware.pdf
|
|
|
|
|
2018-10-25 - GandCrab Ransomware decryption tool.pdf
|
|
|
|
|
2018-10-25 - New sLoad malware downloader being leveraged by APT group TA554 to spread Ramnit.pdf
|
|
|
|
|
2018-10-25 - New Techniques to Uncover and Attribute Cobalt Gang Commodity Builders and Infrastructure Revealed.pdf
|
|
|
|
|
2018-10-26 - Meet CrowdStrike’s Adversary of the Month for October- DUNGEON SPIDER.pdf
|
|
|
|
|
2018-10-28 - LiteHTTP.pdf
|
|
|
|
|
2018-10-29 - GPlayed's younger brother is a banker — and it's after Russian banks.pdf
|
|
|
|
|
2018-10-30 - Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims.pdf
|
|
|
|
|
2018-10-30 - U.S. Indicts Chinese Hacker-Spies in Conspiracy to Steal Aerospace Secrets.pdf
|
|
|
|
|
2018-10-31 - Emotet Awakens With New Campaign of Mass Email Exfiltration.pdf
|
|
|
|
|
2018-10-31 - Let's Learn- Exploring ZeusVM Banking Malware Hooking Engine.pdf
|
|
|
|
|
2018-11-01 - CTA Adversary Playbook- Goblin Panda.pdf
|
|
|
|
|
2018-11-01 - GootKit Analysis (French).pdf
|
|
|
|
|
2018-11-01 - Trickbot Shows Off New Trick- Password Grabber Module.pdf
|
|
|
|
|
2018-11-03 - Là 1937CN hay OceanLotus hay Lazarus ….pdf
|
|
|
|
|
2018-11-04 - BetaBot y Fleercivet, dos nuevos informes de código dañino del CCN-CERT.pdf
|
|
|
|
|
2018-11-05 - Data Talks- Deeper Down the Rabbit Hole- Second-Stage Attack and a Fileless Finale.pdf
|
|
|
|
|
2018-11-05 - Inception Attackers Target Europe with Year-old Office Vulnerability.pdf
|
|
|
|
|
2018-11-05 - Let's Learn- In-Depth Reversing of Hancitor Dropper-Loader- 2016 vs 2018 Malware Progression.pdf
|
|
|
|
|
2018-11-05 - Persian Stalker pillages Iranian users of Instagram and Telegram.pdf
|
|
|
|
|
2018-11-06 - Threat Spotlight- Inside VSSDestroy Ransomware (variant of Matrix Ransom).pdf
|
|
|
|
|
2018-11-07 - BCMPUPnP_Hunter- A 100k Botnet Turns Home Routers to Email Spammers.pdf
|
|
|
|
|
2018-11-07 - Let’s Learn- Introducing Latest TrickBot Point-of-Sale Finder Module.pdf
|
|
|
|
|
2018-11-08 - Deep Analysis of TrickBot New Module pwgrab.pdf
|
|
|
|
|
2018-11-08 - FASTCash- How the Lazarus Group is Emptying Millions from ATMs.pdf
|
|
|
|
|
2018-11-08 - Metamorfo Banking Trojan Keeps Its Sights on Brazil.pdf
|
|
|
|
|
2018-11-09 - Emotet launches major new spam campaign.pdf
|
|
|
|
|
2018-11-12 - Bug in Malware “TSCookie” - Fails to Read Configuration.pdf
|
|
|
|
|
2018-11-12 - What’s new in TrickBot- Deobfuscating elements.pdf
|
|
|
|
|
2018-11-13 - Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign.pdf
|
|
|
|
|
2018-11-13 - HookAds Malvertising Installing Malware via the Fallout Exploit Kit.pdf
|
|
|
|
|
2018-11-13 - Let's Learn- Dissect Panda Banking Malware's -libinject- Process Injection Module.pdf
|
|
|
|
|
2018-11-14 - A new exploit for zero-day vulnerability CVE-2018-8589.pdf
|
|
|
|
|
2018-11-14 - Big Game Hunting- The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware.pdf
|
|
|
|
|
2018-11-15 - Mylobot Continues Global Infections.pdf
|
|
|
|
|
2018-11-15 - tRat- New modular RAT appears in multiple email campaigns.pdf
|
|
|
|
|
2018-11-16 - Analyzing OilRig’s Ops Tempo from Testing to Weaponization to Delivery.pdf
|
|
|
|
|
2018-11-16 - Exploring Emotet- Examining Emotet’s Activities, Infrastructure.pdf
|
|
|
|
|
2018-11-16 - Return to ROKRAT!! (feat. FAAAA...Sad...).pdf
|
|
|
|
|
2018-11-18 - CozyBear – In from the Cold-.pdf
|
|
|
|
|
2018-11-19 - Not So Cozy- An Uncomfortable Examination of a Suspected APT29 Phishing Campaign.pdf
|
|
|
|
|
2018-11-19 - VisionDirect Data Breach Caused by MageCart Attack.pdf
|
|
|
|
|
2018-11-20 - Information, tools, and signatures around the Conficker computer worm.pdf
|
|
|
|
|
2018-11-20 - L0RDIX- MULTIPURPOSE ATTACK TOOL.pdf
|
|
|
|
|
2018-11-20 - Lazarus Continues Heists, Mounts Attacks on Financial Organizations in Latin America.pdf
|
|
|
|
|
2018-11-20 - Sednit- What’s going on with Zebrocy-.pdf
|
|
|
|
|
2018-11-20 - Sofacy Continues Global Attacks and Wheels Out New ‘Cannon’ Trojan.pdf
|
|
|
|
|
2018-11-21 - FIN7 Not Finished – Morphisec Spots New Campaign.pdf
|
|
|
|
|
2018-11-21 - MageCart Group Sabotages Rival to Ruin Data and Reputation.pdf
|
|
|
|
|
2018-11-22 - Turla PNG Dropper is back.pdf
|
|
|
|
|
2018-11-23 - Sload hits Italy. Unveil the power of powershell as a downloader.pdf
|
|
|
|
|
2018-11-26 - A Look into the Connection Between XLoader and FakeSpy, and Their Possible Ties With the Yanbian Gang.pdf
|
|
|
|
|
2018-11-26 - Examining XLoader, FakeSpy, and the Yanbian Gang.pdf
|
|
|
|
|
2018-11-27 - DNSpionage Campaign Targets Middle East.pdf
|
|
|
|
|
2018-11-27 - Let's Learn- In-Depth on Sofacy Cannon Loader-Backdoor Review.pdf
|
|
|
|
|
2018-11-27 - Meet CrowdStrike’s Adversary of the Month for November- HELIX KITTEN.pdf
|
|
|
|
|
2018-11-27 - The SLoad Powershell Threat is Expanding to Italy.pdf
|
|
|
|
|
2018-11-28 - AutoCAD Malware - Computer Aided Theft.pdf
|
|
|
|
|
2018-11-28 - Russian Hackers Haven't Stopped Probing the US Power Grid (Temp.Isotope).pdf
|
|
|
|
|
2018-11-28 - Two Iranian Men Indicted for Deploying Ransomware to Extort Hospitals, Municipalities, and Public Institutions, Causing Over $30 Million in Losses.pdf
|
|
|
|
|
2018-11-29 - Analysis Of Targeted Attack Against Pakistan By Exploiting InPage Vulnerability And Related APT Groups.pdf
|
|
|
|
|
2018-11-29 - Golden Chickens- Uncovering A Malware-as-a-Service (MaaS) Provider and Two New Threat Actors Using It.pdf
|
|
|
|
|
2018-11-29 - How a SamSam-like attack happens, and what you can do about it.pdf
|
|
|
|
|
2018-11-29 - Snakemackerel delivers Zekapab malware.pdf
|
|
|
|
|
2018-11-30 - The Evolution of BackSwap.pdf
|
|
|
|
|
2018-11-30 - Virut Resurrects -- Musings on long-term sinkholing.pdf
|
|
|
|
|
2018-12-01 - Tracking Mirai Variants (Ya Liu & Hui Wang).pdf
|
|
|
|
|
2018-12-02 - The Ransomware Doctor Without A Cure.pdf
|
|
|
|
|
2018-12-03 - Analysis of cyberattack on U.S. think tanks, non-profits, public sector by unidentified attackers.pdf
|
|
|
|
|
2018-12-04 - Hide ‘N Seek botnet continues infecting devices with default credentials, building a P2P network and more..pdf
|
|
|
|
|
2018-12-04 - Malspam pushing Lokibot malware.pdf
|
|
|
|
|
2018-12-05 - APT review of the year.pdf
|
|
|
|
|
2018-12-05 - Farewell to Kelihos and ZOMBIE SPIDER.pdf
|
|
|
|
|
2018-12-05 - STOLEN PENCIL Campaign Targets Academia.pdf
|
|
|
|
|
2018-12-05 - The Dark Side of the ForSSHe.pdf
|
|
|
|
|
2018-12-05 - Torpig.pdf
|
|
|
|
|
2018-12-05 - Trickbot’s Tricks.pdf
|
|
|
|
|
2018-12-06 - DanaBot evolves beyond banking Trojan with new spam‑sending capability.pdf
|
|
|
|
|
2018-12-07 - Mac malware combines EmPyre backdoor and XMRig miner.pdf
|
|
|
|
|
2018-12-07 - Netbooks, RPis, & Bash Bunny Gear - Attacking Banks from the Inside.pdf
|
|
|
|
|
2018-12-10 - Collecting Malicious Particles from Neutrino Botnets.pdf
|
|
|
|
|
2018-12-10 - Let's Learn- Reviewing Sofacy's -Zebrocy- C++ Loader- Advanced Insight.pdf
|
|
|
|
|
2018-12-10 - Let's Learn- Reviewing Sofacy's -Zebrocy- CPlusPlus Loader- Advanced Insight.pdf
|
|
|
|
|
2018-12-10 - Seedworm- Group Compromises Government Agencies, Oil & Gas, NGOs, Telecoms, and IT Firms.pdf
|
|
|
|
|
2018-12-11 - New Satan ransomware variant ‘Lucky’ exposes 10 server-side vulnerabilities.pdf
|
|
|
|
|
2018-12-12 - Dear Joohn- The Sofacy Group’s Global Campaign.pdf
|
|
|
|
|
2018-12-12 - The TrickBot and MikroTik connection.pdf
|
|
|
|
|
2018-12-12 - Zero-day in Windows Kernel Transaction Manager (CVE-2018-8611).pdf
|
|
|
|
|
2018-12-12 - ‘Operation Sharpshooter’ Targets Global Defense, Critical Infrastructure.pdf
|
|
|
|
|
2018-12-13 - POWERSING - From LNK Files To Janicab Through YouTube & Twitter.pdf
|
|
|
|
|
2018-12-13 - Shamoon 3 Targets Oil and Gas Organization.pdf
|
|
|
|
|
2018-12-13 - The Return of The Charming Kitten.pdf
|
|
|
|
|
2018-12-14 - Cybercriminals Use Malicious Memes that Communicate with Malware.pdf
|
|
|
|
|
2018-12-14 - Shamoon- Destructive Threat Re-Emerges with New Sting in its Tail.pdf
|
|
|
|
|
2018-12-18 - Scumbag Combo- Agent Tesla and XpertRAT.pdf
|
|
|
|
|
2018-12-18 - Sofacy Creates New ‘Go’ Variant of Zebrocy Tool.pdf
|
|
|
|
|
2018-12-18 - URSNIF, EMOTET, DRIDEX and BitPaymer Gangs Linked by a Similar Loader.pdf
|
|
|
|
|
2018-12-19 - Analysis of Smoke Loader in New Tsunami Campaign.pdf
|
|
|
|
|
2018-12-19 - Danabot's Travels, A Global Perspective.pdf
|
|
|
|
|
2018-12-19 - MALSPAM PUSHING THE MYDOOM WORM IS STILL A THING.pdf
|
|
|
|
|
2018-12-19 - Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems.pdf
|
|
|
|
|
2018-12-20 - Chinese Hackers Indicted - Members of APT 10 Group Targeted Intellectual Property and Confidential Business Information.pdf
|
|
|
|
|
2018-12-20 - Dissecting the Danabot Payload Targeting Italy.pdf
|
|
|
|
|
2018-12-20 - Middle East Cyber-Espionage- analyzing WindShift's implant- OSX.WindTail (part 1).pdf
|
|
|
|
|
2018-12-20 - With Mirai Comes Miori- IoT Botnet Delivered via ThinkPHP Remote Code Execution Exploit.pdf
|
|
|
|
|
2018-12-21 - FIN7 Not Finished - Morphisec Spots New Campaign.pdf
|
|
|
|
|
2018-12-21 - Let's Learn- In-Depth on APT28-Sofacy Zebrocy Golang Loader.pdf
|
|
|
|
|
2018-12-24 - Let’s dig into Vidar – An Arkei Copycat-Forked Stealer (In-depth analysis).pdf
|
|
|
|
|
2018-12-29 - Malware attack disrupts delivery of L.A. Times and Tribune papers across the U.S..pdf
|
|
|
|
|
2018-12-30 - Retefe unpacker.pdf
|
|
|
|
|
2018-12-31 - FastCashMalwareDissected.pdf
|
|
|
|