ROOTKIT ZEROACCESS REVERSE ENGINEERING |
2010-11-18 | Chris Carboni | Stopping the ZeroAccess Rootkit |
ROOTKIT |
2024-10-09/a> | Xavier Mertens | From Perfctl to InfoStealer |
2016-02-26/a> | Xavier Mertens | Quick Audit of *NIX Systems |
2013-02-21/a> | Bojan Zdrnja | SSHD rootkit in the wild |
2011-12-06/a> | Pedro Bueno | The RedRet connection... |
2011-11-22/a> | Pedro Bueno | Updates on ZeroAccess and BlackHole front... |
2011-07-02/a> | Pedro Bueno | Bootkits, they are back at full speed... |
2011-02-14/a> | Richard Porter | Anonymous Damage Control Anybody? |
2010-11-18/a> | Chris Carboni | Stopping the ZeroAccess Rootkit |
2010-02-19/a> | Mark Hofman | MS10-015 may cause Windows XP to blue screen (but only if you have malware on it) |
2008-05-25/a> | Stephen Hall | Cisco's Response to Rootkit presentation |
2008-05-23/a> | Mike Poor | Cisco IOS Rootkit thoughts |
ZEROACCESS |
2013-07-04/a> | Russ McRee | Celebrating 4th of July With a Malware PCAP Visualization |
2011-11-22/a> | Pedro Bueno | Updates on ZeroAccess and BlackHole front... |
2010-11-18/a> | Chris Carboni | Stopping the ZeroAccess Rootkit |
REVERSE |
2024-12-24/a> | Xavier Mertens | More SSH Fun! |
2021-02-01/a> | Rob VandenBrink | Taking a Shot at Reverse Shell Attacks, CNC Phone Home and Data Exfil from Servers |
2018-06-29/a> | Remco Verhoef | Crypto community target of MacOS malware |
2014-04-13/a> | Kevin Shortt | Reverse Heartbleed Testing |
2012-09-14/a> | Lenny Zeltser | Analyzing Malicious RTF Files Using OfficeMalScanner's RTFScan |
2012-06-04/a> | Lenny Zeltser | Decoding Common XOR Obfuscation in Malicious Code |
2010-11-18/a> | Chris Carboni | Stopping the ZeroAccess Rootkit |
2010-02-13/a> | Lorna Hutcheson | Network Traffic Analysis in Reverse |
ENGINEERING |
2024-12-05/a> | Jesse La Grew | [Guest Diary] Business Email Compromise |
2017-07-16/a> | Renato Marinho | SMS Phishing induces victims to photograph its own token card |
2015-11-21/a> | Didier Stevens | Maldoc Social Engineering Trick |
2014-08-20/a> | Kevin Shortt | Social Engineering Alive and Well |
2013-07-08/a> | Richard Porter | Why do we Click? |
2012-09-14/a> | Lenny Zeltser | Analyzing Malicious RTF Files Using OfficeMalScanner's RTFScan |
2012-06-04/a> | Lenny Zeltser | Decoding Common XOR Obfuscation in Malicious Code |
2011-05-10/a> | Swa Frantzen | Changing MO in scamming our users ? |
2010-12-29/a> | Daniel Wesemann | Beware of strange web sites bearing gifts ... |
2010-11-18/a> | Chris Carboni | Stopping the ZeroAccess Rootkit |
2010-06-14/a> | Manuel Humberto Santander Pelaez | New way of social engineering on IRC |
2010-05-02/a> | Mari Nichols | Zbot Social Engineering |
2010-04-29/a> | Bojan Zdrnja | Who needs exploits when you have social engineering? |
2010-04-13/a> | Johannes Ullrich | More Legal Threat Malware E-Mail |
2009-06-01/a> | G. N. White | Yet another "Digital Certificate" malware campaign |
2009-04-24/a> | Pedro Bueno | Did you check your conference goodies? |
2009-01-18/a> | Maarten Van Horenbeeck | Targeted social engineering |