- The Opt-In Botnet Generation
- The Command Structure of the Aurora Botnet: History, Patterns, and Findings
- Advanced Persistent Threats: A Brief Description
- Extracting CnC from Malware: The Role of Malware Sample Analysis in Botnet Detection
- Serial Variant Evasion Tactics: Techniques Used to Automatically Bypass Antivirus Technologies
- Botnet Communication Topologies: Understanding the intricacies of botnet Command-and-Control
- The Botnet vs. Malware Relationship: The One-to-One Botnet Myth
- Update on the Enemy: A Deconstruction of Who Profits from Botnets
- Anatomy of a Targeted Attack
- Layer 8: How and Why Targeted Attacks Exploit Your Users
- A Technology Comparison: AV, IDS/IPS and Damballa's Response to Targeted Attacks
- Targeted Attacks for Fun and Profit: An Executive Guide to A New and Growing Enterprise Threat
Also don’t forget the recommendation I made on the technical overview at Compass Security, a Swiss company, about a year ago.
No comments:
Post a Comment