Marc Rivero López | @seifreed

Saltar al contenido
  • Inicio
  • Blog Articles
  • Interviews
  • Research Papers
  • Video conferences
  • Contact me

Blog Articles

McAfee

Revil part 1

Revil part 2

Revil part 3

Revil part 4

Take a “NetWalk” on the Wild Side

Operation (노스 스타) North Star A Job Offer That’s Too Good to be True?

RagnarLocker Ransomware Threatens to Release Confidential Information

Tales From the Trenches; a Lockbit Ransomware Story

Nemty Ransomware – Learning by Doing

Spanish MSSP Targeted by BitPaymer Ransomware

Buran Ransomware; the Evolution of VegaLocker

Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study

Clop Ransomware

LockerGoga Ransomware Family Used in Targeted Attacks

Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims

Malware Employs PowerShell to Infect Systems

Locky Ransomware Arrives via Email Attachment

TorrentLocker Campaign Exploits Spanish Utility Brand

Hybrid Analysis – (Company acquired by CrowdStrike)

6 New Hybrid Analysis Features You should Know About
Effective Incident Response

SANS ISC

Malicious Office files using fileless UAC bypass to drop KEYBASE malware

Security by default

Articles

Blog de WordPress.com.
    • Marc Rivero López | @seifreed
    • Personalizar
    • Regístrate
    • Acceder
    • Copiar enlace corto
    • Denunciar este contenido
    • Gestionar las suscripciones