Click here to download all references as Bib-File.•
2019-10-29
⋅
Bitdefender
⋅
A close look at Fallout Exploit Kit and Raccoon Stealer Raccoon |
2019-09-25
⋅
GovCERT.ch
⋅
Trickbot - An analysis of data collected from the botnet TrickBot |
2019-09-04
⋅
Trend Micro
⋅
Glupteba Campaign Hits Network Routers and Updates C&C Servers with Data from Bitcoin Transactions Glupteba |
2019-08-27
⋅
Cisco Talos
⋅
China Chopper still active 9 years later CHINACHOPPER |
2019-08-26
⋅
Bleeping Computer
⋅
New Nemty Ransomware May Spread via Compromised RDP Connections Nemty |
2019-08-21
⋅
Threatgen
⋅
Taking a Closer Look at the LookBack Malware Campaign – Part 1 Lookback |
2019-08-05
⋅
SophosLabs
⋅
Baldr vs The World: A credential thief's burst of creative energy delivers a dangerous new threat Baldr |
2019-07-30
⋅
int 0xcc blog
⋅
Practical Threat Hunting and Incidence Response : A Case of A Pony Malware Infection Pony |
2019-07-24
⋅
Github (br-data)
⋅
Winnti analysis Winnti |
2019-07-24
⋅
Bayerischer Rundfunk
⋅
Attacking the Heart of the German Industry Winnti |
2019-07-15
⋅
Cisco Talos
⋅
SWEED: Exposing years of Agent Tesla campaigns Agent Tesla Formbook Loki Password Stealer (PWS) SWEED |
2019-06-27
⋅
Kaspersky Labs
⋅
Criminals, ATMs and a cup of coffee |
2019-05-14
⋅
Alibaba
⋅
Return of Watchbog: Exploiting Jenkins CVE-2018-1000861 |
2019-05-02
⋅
Medium Sebdraven
⋅
Goblin Panda continues to target Vietnam NewCore RAT |
2019-04-26
⋅
Bleeping Computer
⋅
A Closer Look at the RobbinHood Ransomware RobinHood |
2019-04-16
⋅
Bitdefender
⋅
Inside Scranos – A Cross Platform, Rootkit-Enabled Spyware Operation Scranos |
2019-04-10
⋅
Kaspersky Labs
⋅
The Gaza cybergang and its SneakyPastes campaign Molerats |
2019-04-05
⋅
Medium vishal_thakur
⋅
Trickbot — a concise treatise TrickBot |
2019-03-12
⋅
Palo Alto Networks Unit 42
⋅
Operation Comando: How to Run a Cheap and Effective Credit Card Business Operation Comando |
2019-03-04
⋅
FireEye
⋅
APT40: Examining a China-Nexus Espionage Actor LunchMoney APT40 |