Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-04-27Trend MicroJanus Agcaoili
Hello Ransomware Uses Updated China Chopper Web Shell, SharePoint Vulnerability
CHINACHOPPER Cobalt Strike
2021-04-22The RecordCatalin Cimpanu
Nightmare week for security vendors: Now a Trend Micro bug is being exploited in the wild
2021-04-22Trend MicroAlfredo Oliveira, David Fiser
Tor-Based Botnet Malware Targets Linux Systems, Abuses Cloud Management Tools
2021-04-20Trend MicroTrend Micro
Carbanak and FIN7 Attack Techniques
2021-04-16Trend MicroNitesh Surana
Could the Microsoft Exchange breach be stopped?
CHINACHOPPER
2021-04-16Trend MicroAriel Neimond Lazaro, Dechao Zhao, Luis Magisa, Steven Du
XCSSET Quickly Adapts to macOS 11 and M1-based Macs
XCSSET
2021-04-12Trend MicroDon Ovid Ladores, Frankylnn Uy, Junestherry Salvador, Lala Manly, Raphael Centeno
A Spike in BazarCall and IcedID Activity Detected in March
BazarBackdoor IcedID
2021-04-09Trend MicroDaniel Lunghi, Kenney Lu
Iron Tiger APT Updates Toolkit With Evolved SysUpdate Malware
HyperBro HyperSSL APT27
2021-03-26Trend MicroTrend Micro
Alleged Members of Egregor Ransomware Cartel Arrested
Egregor QakBot
2021-03-05Trend MicroAdi Peretz, Erick Thek, Trend Micro Research
Earth Vetala – MuddyWater Continues to Target Organizations in the Middle East
MuddyWater
2021-03-04Trend MicroDon Ovid Ladores, Junestherry Salvador, Raphael Centeno
New in Ransomware: AlumniLocker, Humble Feature Different Extortion Techniques
2021-03-01Trend MicroDon Ovid Ladores
Povlsomware Ransomware Features Cobalt Strike Compatibility
Povlsomware
2021-02-23Trend MicroByron Gelera, Janus Agcaoili
An Analysis of the Nefilim Ransomware
Nefilim
2021-02-09Trend MicroAlfredo Oliveira, David Fiser
Threat actors now target Docker via container escape features
2021-02-05Trend MicroDon Ovid Ladores, Junestherry Salvador, Llalum Victoria, Monte de Jesus, Nikko Tamana, Raphael Centeno
New in Ransomware: Seth-Locker, Babuk Locker, Maoloa, TeslaCrypt, and CobraLocker
Babuk TeslaCrypt
2021-02-02Trend MicroAbraham Camba, Byron Gelera, Catherine Loveria
Finding and Decoding Multi-Step Obfuscated Malware
2021-01-29Trend MicroTrend Micro
Chopper ASPX web shell used in targeted attack
CHINACHOPPER MimiKatz
2021-01-26Trend MicroTrend Micro Research
Examining a Sodinokibi Attack
REvil
2021-01-25Trend MicroFyodor Yarochkin, Loseway Lu, Marshall Chen, Matsukawa Bakuei, Vladimir Kropotov
Fake Office 365 Used for Phishing Attacks on C-Suite Targets
2021-01-20Trend MicroAbraham Camba, Gilbert Sison, Ryan Maglaque
XDR investigation uncovers PlugX, unique technique in APT attack
PlugX