Skip to content
HP Wolf Security Blog
2021-05-12T07:38:03-07:00
HP Wolf Security Blog
Leading insights, research, and analysis from the HP threat analyst team
AUTHORS
Adrian Taylor
Alex Holland
Alon Nachmany
Bill Hackley
Dan Allen
Dr Michael McGuire
Fraser Kyne
Gavin Hill
Gregory Webb
Ian Pratt
Jack Walker
James Wright
Jennifer Carole
Jessica Morales
Joe Darbyshire
Joe Malinka
Dr Josh Stroschein
Juliann Klein
Kimberly Becan
Vadim Vadim
Lucy Gissing
Matthew Rowen
Michael Rosen
Parag Dixit
Patrick Schläpfer
Ratnesh Pandey
Robert Wiggenhorn
Sherban Naum
Simon Crosby
Simon Plant
Stuart Phillips
HP Wolf Security
Toby Gray
Tomo Kamimura
TOPIC
Into the Web of Profit
Threat Insights Reports
Threat Research
Uncategorized
Search Results
DATE
AUTHOR
TITLE
CLEAR FILTERS
January 19, 2021
Dridex Malicious Document Analysis: Automating the Extraction of Payload URLs
By:
Patrick Schläpfer
READ MORE
October 8, 2020
Droppers, Downloaders and TrickBot: Detecting a Stealthy COVID-19-themed Campaign using Toolmarks
By:
Alex Holland
READ MORE
September 29, 2020
Security Control Assessments: What Security Professionals Can Learn from Building Inspectors
By:
Stuart Phillips
READ MORE
July 1, 2020
Aggah Campaign’s Latest Tactics: Victimology, PowerPoint Dropper and Cryptocurrency Stealer
By:
Alex Holland
READ MORE
June 21, 2020
Investigating Threats in HP Sure Controller 4.2: TVRAT
By:
Alex Holland
READ MORE
February 13, 2020
Spot the Difference: Tracking Malware Campaigns using Visually Similar Images
By:
Alex Holland
READ MORE
December 6, 2019
Tracking Malware Campaigns Using String Metrics
By:
Alex Holland
READ MORE
October 21, 2019
Ransomware Goes Fileless, Uses Malicious Documents and PowerShell to Encrypt Files
By:
Ratnesh Pandey
READ MORE
October 21, 2019
Buran Ransomware Targets German Organisations through Malicious Spam Campaign
By:
Alex Holland
READ MORE
‹
1
2
3
›