|
Up
|
|
|
|
|
2014-01-14 - The Icefog APT Hits US Targets With Java Backdoor.pdf
|
|
|
|
|
2014-01-19 - Vietnamese Malware Gets Very Personal.pdf
|
|
|
|
|
2014-01-21 - Digitally signed data-stealing malware targets Mac users in “undelivered courier item” attack.pdf
|
|
|
|
|
2014-01-22 - Iran and Russia blamed for state-sponsored espionage.pdf
|
|
|
|
|
2014-02-02 - U.S. Leads Multi-National Action Against “Gameover Zeus” Botnet and “Cryptolocker” Ransomware, Charges Botnet Administrator.pdf
|
|
|
|
|
2014-02-03 - Needle in a haystack.pdf
|
|
|
|
|
2014-02-06 - Исследуем Linux Botnet «BillGates».pdf
|
|
|
|
|
2014-02-10 - The Careto-Mask APT- Frequently Asked Questions.pdf
|
|
|
|
|
2014-02-14 - Analysis of DHS NCCIC Indicators.pdf
|
|
|
|
|
2014-02-15 - Examining Your Very Own Sefnit Trojan.pdf
|
|
|
|
|
2014-02-16 - Analysis of CoinThief-A -dropper-.pdf
|
|
|
|
|
2014-02-17 - Hiding in plain sight- a story about a sneaky banking Trojan.pdf
|
|
|
|
|
2014-02-19 - XtremeRAT- Nuisance or Threat-.pdf
|
|
|
|
|
2014-02-21 - An In‑depth Analysis of Linux-Ebury.pdf
|
|
|
|
|
2014-02-21 - CVE 2014-0322 Malware - Sakurel (Feb 21, 2014).pdf
|
|
|
|
|
2014-02-24 - The Art of Attribution Identifying and Pursuing your Cyber Adversaries.pdf
|
|
|
|
|
2014-02-28 - Uroburos - highly complex espionage software with Russian roots.pdf
|
|
|
|
|
2014-03-05 - Android RATs Branch out with Dendroid.pdf
|
|
|
|
|
2014-03-06 - Dexter, Project Hook POS Malware Campaigns Persist.pdf
|
|
|
|
|
2014-03-06 - The Siesta Campaign- A New Targeted Attack Awakens.pdf
|
|
|
|
|
2014-03-07 - Uroburos – Deeper travel into kernel protection mitigation.pdf
|
|
|
|
|
2014-03-12 - A Detailed Examination of the Siesta Campaign.pdf
|
|
|
|
|
2014-03-12 - Agent.btz- a Source of Inspiration-.pdf
|
|
|
|
|
2014-03-12 - Uroburos the Snake Rootkit.pdf
|
|
|
|
|
2014-03-18 - Operation Windigo – the vivisection of a large Linux server‑side credential‑stealing malware campaign.pdf
|
|
|
|
|
2014-03-18 - Windigo Linux Analysis – Ebury and Cdorked.pdf
|
|
|
|
|
2014-03-25 - Spear Phishing the News Cycle- APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370.pdf
|
|
|
|
|
2014-04-02 - Tofsee botnet.pdf
|
|
|
|
|
2014-04-09 - BackDoor.Gootkit.112—a new multi-purpose backdoor.pdf
|
|
|
|
|
2014-04-15 - Trojan banking.pdf
|
|
|
|
|
2014-04-17 - A quick analysis of the latest Shadow Brokers dump.pdf
|
|
|
|
|
2014-04-18 - TROJ64_WOWLIK.VT.pdf
|
|
|
|
|
2014-04-21 - Hacking Team.pdf
|
|
|
|
|
2014-04-27 - Analysis of the Predator Pain Keylogger.pdf
|
|
|
|
|
2014-05-06 - Rovnix new “evolution”.pdf
|
|
|
|
|
2014-05-13 - Cat Scratch Fever- CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN.pdf
|
|
|
|
|
2014-05-13 - Uroburos rootkit- Belgian Foreign Ministry stricken.pdf
|
|
|
|
|
2014-05-15 - DDoS Trojans attack Linux.pdf
|
|
|
|
|
2014-05-16 - APT Campaign Leverages the Cueisfry Trojan and Microsoft Word Vulnerability CVE-2014-1761.pdf
|
|
|
|
|
2014-05-19 - 5 in China Army Face U.S. Charges of Cyberattacks.pdf
|
|
|
|
|
2014-05-22 - Meet the Zberp Trojan.pdf
|
|
|
|
|
2014-05-29 - Iranian hackers sucker punch U.S. defense officials with creative social-media scam.pdf
|
|
|
|
|
2014-05-30 - Taking off the Blackshades.pdf
|
|
|
|
|
2014-06-02 - Analysis of Uroburos, using WinDbg.pdf
|
|
|
|
|
2014-06-02 - Molerats, Here for Spring!.pdf
|
|
|
|
|
2014-06-02 - Sinowal banking trojan.pdf
|
|
|
|
|
2014-06-04 - Introducing Antak - A webshell which utilizes powershell.pdf
|
|
|
|
|
2014-06-09 - ZeuS.Maple Variant Targets Canadian Online Banking Customers.pdf
|
|
|
|
|
2014-06-10 - Clandestine Fox, Part Deux.pdf
|
|
|
|
|
2014-06-18 - Neutrino Bot (aka MS-Win32-Kasidet).pdf
|
|
|
|
|
2014-06-23 - Havex Hunts For ICS-SCADA Systems.pdf
|
|
|
|
|
2014-07-02 - KIVARS With Venom- Targeted Attacks Upgrade with 64-bit “Support”.pdf
|
|
|
|
|
2014-07-07 - Deep in Thought- Chinese Targeting of National Security Think Tanks.pdf
|
|
|
|
|
2014-07-07 - Disect Android APKs like a Pro - Static code analysis.pdf
|
|
|
|
|
2014-07-08 - Security Matters - Cyberespionage Campaign Hits Energy Companies.pdf
|
|
|
|
|
2014-07-09 - BrutPOS- RDP Bruteforcing Botnet Targeting POS Systems.pdf
|
|
|
|
|
2014-07-10 - Versatile DDoS Trojan for Linux.pdf
|
|
|
|
|
2014-07-11 - The Father of Zeus- Kronos Malware Discovered.pdf
|
|
|
|
|
2014-07-15 - Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities.pdf
|
|
|
|
|
2014-07-15 - Unit 42 Technical Analysis- Seaduke.pdf
|
|
|
|
|
2014-07-16 - Mini Analysis of the TinyBanker Tinba.pdf
|
|
|
|
|
2014-07-18 - Bird's nest.pdf
|
|
|
|
|
2014-07-31 - Poweliks- the persistent malware without a file.pdf
|
|
|
|
|
2014-07-31 - Spy of the Tiger.pdf
|
|
|
|
|
2014-08-04 - New Release- Decrypting NetWire C2 Traffic.pdf
|
|
|
|
|
2014-08-07 - Innaput Actors Utilize Remote Access Trojan Since 2016, Presumably Targeting Victim Files.pdf
|
|
|
|
|
2014-08-07 - Malware Analysis of the Lurk Downloader.pdf
|
|
|
|
|
2014-08-07 - Sophisticated 'Turla' hackers spying on European governments, say researchers.pdf
|
|
|
|
|
2014-08-07 - The Epic Turla Operation.pdf
|
|
|
|
|
2014-08-11 - mht, MS12-27 and malware .info.pdf
|
|
|
|
|
2014-08-14 - Hunting the Mutex.pdf
|
|
|
|
|
2014-08-19 - APT Gang Branches Out to Medical Espionage in Community Health Breach.pdf
|
|
|
|
|
2014-08-20 - “El Machete”.pdf
|
|
|
|
|
2014-08-24 - Another country-sponsored #malware- Vietnam APT Campaign.pdf
|
|
|
|
|
2014-08-24 - Another country-sponsored malware- Vietnam APT Campaign.pdf
|
|
|
|
|
2014-08-27 - NetTraveler Gets a Makeover for 10th Anniversary.pdf
|
|
|
|
|
2014-08-28 - BIFROSE Now More Evasive Through Tor, Used for Targeted Attack.pdf
|
|
|
|
|
2014-08-28 - Scanbox- A Reconnaissance Framework Used with Watering Hole Attacks.pdf
|
|
|
|
|
2014-08-29 - Connecting the Dots- Syrian Malware Team Uses BlackWorm for Attacks.pdf
|
|
|
|
|
2014-08-29 - New BlackPOS Malware Emerges in the Wild, Targets Retail Accounts.pdf
|
|
|
|
|
2014-08-29 - Sinkholing the Backoff POS Trojan.pdf
|
|
|
|
|
2014-08-31 - Introduction to the ZeroLocker ransomware.pdf
|
|
|
|
|
2014-09-03 - ALDIBOT.pdf
|
|
|
|
|
2014-09-03 - Darwin’s Favorite APT Group.pdf
|
|
|
|
|
2014-09-04 - PITOU- The -silent- resurrection of the notorious Srizbi kernel spambot.pdf
|
|
|
|
|
2014-09-11 - TorrentLocker Ransomware Cracked and Decrypter has been made.pdf
|
|
|
|
|
2014-09-19 - Malware microevolution.pdf
|
|
|
|
|
2014-09-19 - Recent Watering Hole Attacks Attributed to APT Group “th3bug” Using Poison Ivy.pdf
|
|
|
|
|
2014-09-21 - Reversing Tinba- World's smallest trojan-banker DGA Code.pdf
|
|
|
|
|
2014-09-22 - Tinba Malware Reloaded and Attacking Banks Around the World.pdf
|
|
|
|
|
2014-09-23 - Android malware based on SMS encryption and with KitKat support.pdf
|
|
|
|
|
2014-09-23 - MALWARE-CNC Win.Trojan.Aytoke variant outbound connection.pdf
|
|
|
|
|
2014-09-29 - MMD-0028-2014 - Linux-XOR.DDoS- Fuzzy reversing a new China ELF.pdf
|
|
|
|
|
2014-10-02 - Occupy Central- The Umbrella Revolution and Chinese Intelligence.pdf
|
|
|
|
|
2014-10-03 - New Indicators of Compromise for APT Group Nitro Uncovered.pdf
|
|
|
|
|
2014-10-05 - Dissecting SmokeLoader (or Yulia's sweet ass proposition).pdf
|
|
|
|
|
2014-10-06 - Data Theft in Aisle 9- A FireEye Look at Threats to Retailers.pdf
|
|
|
|
|
2014-10-14 - CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda.pdf
|
|
|
|
|
2014-10-14 - CVE‑2014‑4114- Details on August BlackEnergy PowerPoint Campaigns.pdf
|
|
|
|
|
2014-10-14 - Sandworm Windows zero-day vulnerability being actively exploited in targeted attacks.pdf
|
|
|
|
|
2014-10-14 - Security vendors take action against Hidden Lynx malware.pdf
|
|
|
|
|
2014-10-15 - Operation Windigo- “Good job, ESET!” says malware author.pdf
|
|
|
|
|
2014-10-20 - OrcaRAT - A whale of a tale.pdf
|
|
|
|
|
2014-10-27 - Full Disclosure of Havex Trojans.pdf
|
|
|
|
|
2014-10-27 - ScanBox framework – who’s affected, and who’s using it-.pdf
|
|
|
|
|
2014-10-30 - COM Object hijacking- the discreet way of persistence.pdf
|
|
|
|
|
2014-11-03 - BE2 custom plugins, router abuse, and target profiles.pdf
|
|
|
|
|
2014-11-10 - The Darkhotel APT.pdf
|
|
|
|
|
2014-11-10 - Thoughts on Absolute Computrace.pdf
|
|
|
|
|
2014-11-10 - Timeline of Sandworm Attacks.pdf
|
|
|
|
|
2014-11-11 - The Uroburos case- new sophisticated RAT identified.pdf
|
|
|
|
|
2014-11-12 - Korplug military targeted attacks- Afghanistan & Tajikistan.pdf
|
|
|
|
|
2014-11-13 - BASHLITE Affects Devices Running on BusyBox.pdf
|
|
|
|
|
2014-11-13 - Chinese hackers 'breach Australian media organisations' ahead of G20.pdf
|
|
|
|
|
2014-11-14 - OnionDuke- APT Attacks Via the Tor Network.pdf
|
|
|
|
|
2014-11-15 - OnionDuke samples.pdf
|
|
|
|
|
2014-11-19 - ROVNIX Infects Systems with Password-Protected Macros.pdf
|
|
|
|
|
2014-11-21 - Operation Double Tap.pdf
|
|
|
|
|
2014-11-24 - I am Ironman- DEEP PANDA Uses Sakula Malware to Target Organizations in Multiple Sectors.pdf
|
|
|
|
|
2014-11-24 - Regin- nation-state ownage of GSM networks.pdf
|
|
|
|
|
2014-11-25 - Curious Korlia.pdf
|
|
|
|
|
2014-11-25 - Regin APT Attacks Among the Most Sophisticated Ever Analyzed.pdf
|
|
|
|
|
2014-11-26 - Getmypass Point of Sale Malware.pdf
|
|
|
|
|
2014-11-26 - TR-23 Analysis - NetWiredRC malware.pdf
|
|
|
|
|
2014-11-27 - New PoS Malware Kicks off Holiday Shopping Weekend.pdf
|
|
|
|
|
2014-11-30 - W32-HiAsm.A!tr.pdf
|
|
|
|
|
2014-12-08 - The Hack of Sony Pictures- What We Know and What You Need to Know.pdf
|
|
|
|
|
2014-12-08 - The ‘Penquin’ Turla.pdf
|
|
|
|
|
2014-12-09 - Blue Coat Exposes “The Inception Framework”; Very Sophisticated, Layered Malware Attack Targeted at Military, Diplomats, and Bus.pdf
|
|
|
|
|
2014-12-09 - Blue Coat Exposes “The Inception Framework”; Very Sophisticated, Layered Malware Attack Targeted at Military, Diplomats, and Business Execs.pdf
|
|
|
|
|
2014-12-09 - Linux Modules Connected to Turla APT Discovered.pdf
|
|
|
|
|
2014-12-10 - Cloud Atlas- RedOctober APT is back in style.pdf
|
|
|
|
|
2014-12-11 - The Evolution of Point-of-Sale (PoS) Malware.pdf
|
|
|
|
|
2014-12-15 - Banatrix – an indepth look.pdf
|
|
|
|
|
2014-12-16 - EvilBunny- Malware Instrumented By Lua.pdf
|
|
|
|
|
2014-12-17 - Dyre Banking Trojan.pdf
|
|
|
|
|
2014-12-18 - Alina POS malware 'sparks' off a new variant.pdf
|
|
|
|
|
2014-12-18 - Chthonic- a new modification of ZeuS.pdf
|
|
|
|
|
2014-12-19 - Alert (TA14-353A)- Targeted Destructive Malware.pdf
|
|
|
|
|
2014-12-19 - The unrelenting evolution of Vawtrak.pdf
|
|
|
|
|
2014-12-21 - The DGA of Ramnit.pdf
|
|
|
|
|
2014-12-22 - Virlock- First Self‑Reproducing Ransomware is also a Shape Shifter.pdf
|
|
|
|