69 articles about Whitepapers

Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction
Bitdefender

August 06, 2019

1 min read
Astaroth Trojan Resurfaces, Targets Brazil through Fileless Campaign Astaroth Trojan Resurfaces, Targets Brazil through Fileless Campaign
Liviu ARSENE

July 09, 2019

1 min read
Scranos Revisited – Rethinking persistence to keep established network alive Scranos Revisited – Rethinking persistence to keep established network alive
Bogdan BOTEZATU

June 25, 2019

1 min read
An APT Blueprint: Gaining New Visibility into Financial Threats An APT Blueprint: Gaining New Visibility into Financial Threats
Liviu ARSENE

June 04, 2019

2 min read
Yet Another Meltdown – A Microarchitectural Fill Buffer Data Sampling Vulnerability (CVE-2018-12130) Yet Another Meltdown – A Microarchitectural Fill Buffer Data Sampling Vulnerability (CVE-2018-12130)
Bogdan BOTEZATU

May 15, 2019

1 min read
Inside Scranos – A Cross Platform, Rootkit-Enabled Spyware Operation Inside Scranos – A Cross Platform, Rootkit-Enabled Spyware Operation
Bogdan BOTEZATU

April 16, 2019

1 min read
Triout - Spyware Framework for Android with Extensive Surveillance Capabilities Triout - Spyware Framework for Android with Extensive Surveillance Capabilities
Liviu ARSENE

August 20, 2018

1 min read
Six Years and Counting: Inside the Complex Zacinlo Ad Fraud Operation Six Years and Counting: Inside the Complex Zacinlo Ad Fraud Operation
Bogdan BOTEZATU

June 18, 2018

1 min read
RadRAT: An all-in-one toolkit for complex espionage ops RadRAT: An all-in-one toolkit for complex espionage ops
Bogdan BOTEZATU

April 13, 2018

1 min read
1 ... 5 6 7 8

Bookmarks