Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-08-05SophosLabsAlbert Zsigovits
Baldr vs The World: A credential thief's burst of creative energy delivers a dangerous new threat
Baldr
2019-07-30int 0xcc blogRaashid Bhat
Practical Threat Hunting and Incidence Response : A Case of A Pony Malware Infection
Pony
2019-07-24Github (br-data)Hakan Tanriverdi, Jan Strozyk, Maximilian Zierer, Rebecca Ciesielski, Svea Eckert
Winnti analysis
Winnti
2019-07-24Bayerischer RundfunkHakan Tanriverdi, Jan Strozyk, Maximilian Zierer, Rebecca Ciesielski, Svea Eckert
Attacking the Heart of the German Industry
Winnti
2019-07-15Cisco TalosEdmund Brumaghin
SWEED: Exposing years of Agent Tesla campaigns
Agent Tesla Formbook Loki Password Stealer (PWS) SWEED
2019-06-27Kaspersky LabsKonstantin Zykov
Criminals, ATMs and a cup of coffee
2019-05-14AlibabaAlibaba Cloud Security
Return of Watchbog: Exploiting Jenkins CVE-2018-1000861
2019-05-02Medium SebdravenSébastien Larinier
Goblin Panda continues to target Vietnam
NewCore RAT
2019-04-26Bleeping ComputerLawrence Abrams
A Closer Look at the RobbinHood Ransomware
RobinHood
2019-04-16BitdefenderAndrei Ardelean, Bogdan Botezatu, Cristofor Ochinca
Inside Scranos – A Cross Platform, Rootkit-Enabled Spyware Operation
Scranos
2019-04-10Kaspersky LabsKaspersky Team
The Gaza cybergang and its SneakyPastes campaign
Molerats
2019-04-05Medium vishal_thakurVishal Thakur
Trickbot — a concise treatise
TrickBot
2019-03-12Palo Alto Networks Unit 42Unit 42
Operation Comando: How to Run a Cheap and Effective Credit Card Business
Operation Comando
2019-03-04FireEyeBen Read, Fred Plan, Jacqueline O’Leary, Nalani Fraser, Vincent Cannon
APT40: Examining a China-Nexus Espionage Actor
LunchMoney APT40
2019-02-13Department of JusticeOffice of Public Affairs
Former U.S. Counterintelligence Agent Charged With Espionage on Behalf of Iran; Four Iranians Charged With a Cyber Campaign Targeting Her Former Colleagues
Charming Kitten
2019-02-01Github (Zenexer)Paul Buonopane
Information about lnkr5, malware distributed via Chrome extensions
LNKR
2019-01-29CodeWareCoveWare
Phobos Ransomware, A Combo of CrySiS and Dharma
Phobos
2019-01-17CyberArkDavid Cohen
Qealler — The Silent Java Credential Thief
Qealler
2019-01-03CybereasonEli Salem, Lior Rochberger, Niv Yona
LOLbins and trojans: How the Ramnit Trojan spreads via sLoad in a cyberattack
sLoad
2019-01-01Saudi Arabia CNASaudi Arabia CNA
Destructive Attack “DUSTMAN” Technical Report
DUSTMAN