Intruders in the Library: Exploring DLL Hijacking 4,764 people reacted Intruders in the Library: Exploring DLL Hijacking By Tom Fakterman, Chen Erlich and Assaf Dahan February 22, 2024 at 4:00 PM 12 14 min. read
Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure 67,699 people reacted Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure By Or Chechik October 31, 2022 at 6:00 AM 17 10 min. read
Weaponization of Excel Add-Ins Part 2: Dridex Infection Chain Case Studies 46,765 people reacted Weaponization of Excel Add-Ins Part 2: Dridex Infection Chain Case Studies By Saqib Khanzada May 19, 2022 at 12:00 PM 21 8 min. read
Weaponization of Excel Add-Ins Part 1: Malicious XLL Files and Agent Tesla Case Studies 68,637 people reacted Weaponization of Excel Add-Ins Part 1: Malicious XLL Files and Agent Tesla Case Studies By Yaron Samuel January 25, 2022 at 6:00 AM 9 8 min. read
Phishing Eager Travelers 53,302 people reacted Phishing Eager Travelers By Anna Chung and Swetha Balla September 15, 2021 at 6:00 AM 31 9 min. read
Wireshark Tutorial: Examining Dridex Infection Traffic 57,466 people reacted Wireshark Tutorial: Examining Dridex Infection Traffic By Brad Duncan October 23, 2020 at 9:00 AM 39 12 min. read
Locky: New Ransomware Mimics Dridex-Style Distribution By Brandon Levene, Micah Yates and Rob Downs February 16, 2016 at 4:20 PM 9 4 min. read
Dridex is Back and Targeting the UK By Brandon Levene and Rob Downs October 1, 2015 at 1:58 PM 4 2 min. read
Dridex Banking Trojan Begins 2015 with a Bang By Ryan Olson January 16, 2015 at 3:45 PM 4 2 min. read
Dridex Banking Trojan Distributed Through Word Documents By Ryan Olson October 24, 2014 at 3:40 PM 4 3 min. read