Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-05-26CrowdStrikeConnor McGarr
Know Your Enemy: Exploiting the Dell BIOS Driver Vulnerability to Defend Against It
2020-05-20ZscalerAmandeep Kumar, Rohit Chaturvedi
Latest Version of Amadey Introduces Screen Capturing and Pushes the Remcos RAT
Amadey Remcos
2020-04-14Palo Alto Networks Unit 42Adrian McCabe, Juan Cortes, Vicky Ray
Malicious Attackers Target Government and Medical Organizations With COVID-19 Themed Phishing Campaigns
Agent Tesla EDA2
2020-04-06McAfeeMcAfee Insights
McAfee Insights: Vicious Panda: The COVID Campaign
2020-04-02McAfeeAlexandre Mundo, Marc Rivero López
Nemty Ransomware – Learning by Doing
Nemty
2020-03-26McAfeeAlexandre Mundo
Ransomware Maze
Maze
2020-03-18BitdefenderAlexandru Maximciuc, Cristina Vatamanu, Liviu Arsene, Radu Tudorica
New TrickBot Module Bruteforces RDP Connections, Targets Select Telecommunication Services in US and Hong Kong
TrickBot
2020-03-09PWC UKKris McConkey, Sveva Vittoria Scenarelli
Tracking ‘Kimsuky’, the North Korea-based cyber espionage group: Part 1
BabyShark MyDogs Kimsuky
2020-03-09PWC UKKris McConkey, Sveva Vittoria Scenarelli
Tracking ‘Kimsuky’, the North Korea-based cyber espionage group: Part 2
BabyShark MyDogs Kimsuky
2020-02-20McAfeeChristiaan Beek, Darren Fitzpatrick, Eamonn Ryan
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II
Cobalt Strike LockerGoga Maze MegaCortex
2020-02-18PWC UKKris McConkey, Sveva Vittoria Scenarelli
Tracking ‘Kimsuky’, the North Korea-based cyber espionage group: Part 1
Kimsuky
2020-02-12McAfeeChristiaan Beek
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part I
FriedEx
2020-01-26Brown Farinholt, Damon McCoy, Kirill Levchenko, Mohammad Rezaeirad
Dark Matter: Uncovering the DarkComet RAT Ecosystem
DarkComet
2020-01-23Palo Alto Networks Unit 42Adrian McCabe, Unit42
The Fractured Statue Campaign: U.S. Government Targeted in Spear-Phishing Attacks
CARROTBALL CarrotBat Syscon
2020-01-01Trend MicroFyodor Yarochkin, Robert McArdle, Vladimir Kropotov
The Hacker Infrastructureand Underground Hosting:Services Used by Criminals
2019-11-05McAfeeAlexandre Mundo, Marc Rivero López
Buran Ransomware; the Evolution of VegaLocker
VegaLocker
2019-10-21FortinetChris Navarrete, Xiaopeng Zhang
New Variant of Remcos RAT Observed In the Wild
Remcos
2019-10-20McAfeeChristiaan Beek, Jessica Saavedra-Morales, Ryan Sherstobitoff
McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – Crescendo
REvil
2019-10-10ESET ResearchZuzana Hromcová
ESET discovers Attor, a spy platform with curious GSM fingerprinting
Attor Attor
2019-10-10ESET ResearchZuzana Hromcová
ESET discovers Attor, a spy platform with curious GSM fingerprinting
Attor