Some Great Links for Malware Research

Last week I attended this years Brucon, where I had the chance to participate in the Malware Triage workshop by https://twitter.com/herrcore and https://twitter.com/seanmw. The workshop is awesome (look here to get the idea: http://herrcore.blogspot.de/2014/09/crowdsourced-malware-triage.html) and if you have the chance to take it go for it! The links here are from their slides and I post it in agreement (thank you):

Slides OWASP Meeting Cologne

Yesterday I had a talk at the OWASP meeting Cologne, here are the slides:

owasp-meeting-cologne-30-09-2015

Unfortunately Evernote Presentation Mode does not support PDF export on Windows, so no working links in the PDF.

Here is the link list:
https://govolution.wordpress.com

https://twitter.com/DanielX4v3r

http://resources.infosecinstitute.com/shellcode-detection-emulation-libemu/

https://www.winitor.com/

https://netzpolitik.org/2015/digital-attack-on-german-parliament-investigative-report-on-the-hack-of-the-left-party-infrastructure-in-bundestag/

http://codewhitesec.blogspot.de/2015/07/symantec-endpoint-protection.html

http://googleprojectzero.blogspot.de/2015/09/kaspersky-mo-unpackers-mo-problems.html

https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140508-0_AVG_Remote_Administration_Multiple_critical_vulnerabilities_v10.txt

http://googleprojectzero.blogspot.de/2015/06/analysis-and-exploitation-of-eset.html

http://www.heise.de/newsticker/meldung/Angreifer-koennen-Viren-Scanner-von-BullGuard-und-Panda-lahmlegen-2639307.html

http://www.pdf-archive.com/2014/12/30/2014-en-breakingavsoftware-joxeankoret/2014-en-breakingavsoftware-joxeankoret.pdf

https://funoverip.net/2013/12/turning-your-antivirus-into-my-botnet-owasp-benelux-2013-slides/

https://deepsec.net/docs/Slides/2014/Why_Antivirus_Fails_-_Daniel_Sauder.pdf