Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-01-19Trend MicroFernando Mercês, Stephen Hilt
VPNFilter Two Years Later: Routers Still Compromised
VPNFilter
2021-01-06Trend MicroLeandro Froes
Expanding Range and Improving Speed: A RansomExx Approach
RansomEXX
2021-01-05Trend MicroTrend Micro Research
An Overview of the DoppelPaymer Ransomware
DoppelPaymer
2021-01-05Trend MicroTrend Micro Research
Earth Wendigo Injects JavaScript Backdoor to Service Worker for Mailbox Exfiltration
Cobalt Strike Earth Wendigo
2020-12-18Trend MicroJunestherry Salvador, Matthew Camacho, Raphael Centeno
Negasteal Uses Hastebin for Fileless Delivery of Crysis Ransomware
Agent Tesla Dharma
2020-12-18Trend MicroDavid Fiser
TeamTNT Now Deploying DDoS-Capable IRC Bot TNTbotinger
PerlBot TNTbotinger TeamTNT
2020-12-17Trend MicroFeike Hacquebord, Lord Alfred Remorin
Pawn Storm’s Lack of Sophistication as a Strategy
DriveOcean
2020-12-17Trend MicroAliakbar Zahravi, William Gamazo Sanchez
Credential Stealer Targets US, Canadian Bank Customers
2020-12-15Trend MicroBuddy Tancio, Gilbert Sison, Lenart Bermejo
Finding APTX: Attacks via MITRE TTPs
Chinoxy
2020-12-15Trend MicroTrend Micro
Overview of Recent Sunburst Targeted Attacks
SUPERNOVA
2020-12-15Trend MicroWilliam Gamazo Sanchez
Who is the Threat Actor Behind Operation Earth Kitsune?
Freenki Loader SLUB Earth Kitsune
2020-12-14Trend MicroTrend Micro Research
Egregor Ransomware Launches String of High-Profile Attacks to End 2020
Egregor
2020-12-11Trend MicroMarc Lanzendorfer
Investigating the Gootkit Loader
GootKit
2020-12-09Trend MicroEcular Xu, Jaromír Hořejší, Joseph C Chen
SideWinder Leverages South Asian Territorial Issues for Spear Phishing and Mobile Device Attacks
Meterpreter SideWinder RAZOR TIGER
2020-12-01Trend MicroRyan Flores
The Impact of Modern Ransomware on Manufacturing Networks
Maze Petya REvil
2020-11-27Trend MicroLuis Magisa, Steven Du
New MacOS Backdoor Connected to OceanLotus Surfaces
OceanLotus APT32
2020-11-24Trend MicroDavid Fiser, Jaromír Hořejší
Analysis of Kinsing Malware's Use of Rootkit
Kinsing Kinsing
2020-11-20Trend MicroAbraham Camba, Bren Matthew Ebriega, Gilbert Sison
Weaponizing Open Source Software for Targeted Attacks
LaZagne Defray PlugX
2020-11-16Trend MicroTrendmicro
Malicious Actors Target Comm Apps such as Zoom, Slack, Discord
WebMonitor RAT
2020-11-09Trend MicroZhengyu Dong
An Old Joker’s New Tricks: Using Github To Hide Its Payload
Joker