1.使用Radare2和ruby写恶意软件配置文件解析
http://www.morphick.com/blog/2016/1/6/writing-a-malware-config-parser-using-radare2-and-ruby
2.另一款签名的恶意软件:Spymel
http://research.zscaler.com/2016/01/yet-another-signed-malware-spymel.html
3.Blackphone被暴可被接管的风险漏洞
https://www.sentinelone.com/blog/vulnerability-in-blackphone-puts-devices-at-risk-for-takeover/
4.Let's Encrypt项目被Malvertisers滥用
5.“逆向工程”真正的蜡烛
https://cpldcpu.wordpress.com/2016/01/05/reverse-engineering-a-real-candle/
6.GunCon3逆向和Linux驱动
https://beardypig.github.io/2016/01/06/guncon3/
7.从HTTPS到http的referer泄露
http://c0rni3sm.blogspot.com/2016/01/referrer-leakage-from-https-to-https.html
8.通过部署蜜罐捕捉0DAY第一部分
9.使用idapython使你的逆向生活更轻松第四部分
http://researchcenter.paloaltonetworks.com/2016/01/using-idapython-to-make-your-life-easier-part-4/
10.cisco VLAN Trunking协议漏洞
http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20060913-vtp
11.Kaspersky Labs DLL Hijacking
https://cxsecurity.com/issue/WLB-2016010022
12.针对乌克兰网络攻击的恶意文件样本分析
13.VoLTE安全分析第一部分
https://www.insinuator.net/2016/01/security-analysis-of-volte-part-1/
14.Kippo配置netscreen后门蜜罐