55 articles about Whitepapers

An Overview of WMI Hijacking Techniques in Modern Malware An Overview of WMI Hijacking Techniques in Modern Malware
Ruben Andrei CONDOR

October 28, 2020

1 min read
Interplanetary Storm Botnet Shows Signs of Anonymization-Purpose Proxy-for-Hire Infrastructure Interplanetary Storm Botnet Shows Signs of Anonymization-Purpose Proxy-for-Hire Infrastructure
Silvia PRIPOAELiviu ARSENE
1 min read
LemonDuck Crypto-Miner - a KingMiner Successor LemonDuck Crypto-Miner - a KingMiner Successor
Janos Gergo SZELES

October 08, 2020

1 min read
APT Hackers for Hire Used for Industrial Espionage APT Hackers for Hire Used for Industrial Espionage
Liviu ARSENE

August 20, 2020

1 min read
Smart Locks Not So Smart with Wi-Fi Security Smart Locks Not So Smart with Wi-Fi Security
Bogdan BOTEZATU

August 10, 2020

1 min read
Kingminer Botnet Keeps up with the Times Kingminer Botnet Keeps up with the Times
Janos Gergo SZELES

July 08, 2020

1 min read
StrongPity APT - Revealing Trojanized Tools, Working Hours and Infrastructure StrongPity APT - Revealing Trojanized Tools, Working Hours and Infrastructure
Liviu ARSENE

June 30, 2020

2 min read
BitterAPT Revisited: the Untold Evolution of an Android Espionage Tool BitterAPT Revisited: the Untold Evolution of an Android Espionage Tool
Oana ASOLTANEI

June 18, 2020

1 min read
Banking Trojan Metamorfo Hijacks Trusted Apps to Run Malware Banking Trojan Metamorfo Hijacks Trusted Apps to Run Malware
Bogdan BOTEZATU

June 04, 2020

2 min read
1 2 3 ... 7

Bookmarks