Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-10-29BitdefenderBitdefender
A close look at Fallout Exploit Kit and Raccoon Stealer
Raccoon
2019-09-25GovCERT.chGovCERT.ch
Trickbot - An analysis of data collected from the botnet
TrickBot
2019-09-04Trend MicroJaromír Hořejší, Joseph C. Chen
Glupteba Campaign Hits Network Routers and Updates C&C Servers with Data from Bitcoin Transactions
Glupteba
2019-08-27Cisco TalosPaul Rascagnères, Vanja Svajcer
China Chopper still active 9 years later
CHINACHOPPER
2019-08-26Bleeping ComputerIonut Ilascu
New Nemty Ransomware May Spread via Compromised RDP Connections
Nemty
2019-08-21ThreatgenPascal Ackerman
Taking a Closer Look at the LookBack Malware Campaign – Part 1
Lookback
2019-08-05SophosLabsAlbert Zsigovits
Baldr vs The World: A credential thief's burst of creative energy delivers a dangerous new threat
Baldr
2019-07-30int 0xcc blogRaashid Bhat
Practical Threat Hunting and Incidence Response : A Case of A Pony Malware Infection
Pony
2019-07-24Github (br-data)Hakan Tanriverdi, Jan Strozyk, Maximilian Zierer, Rebecca Ciesielski, Svea Eckert
Winnti analysis
Winnti
2019-07-24Bayerischer RundfunkHakan Tanriverdi, Jan Strozyk, Maximilian Zierer, Rebecca Ciesielski, Svea Eckert
Attacking the Heart of the German Industry
Winnti
2019-07-15Cisco TalosEdmund Brumaghin
SWEED: Exposing years of Agent Tesla campaigns
Agent Tesla Formbook Loki Password Stealer (PWS) SWEED
2019-06-27Kaspersky LabsKonstantin Zykov
Criminals, ATMs and a cup of coffee
2019-05-14AlibabaAlibaba Cloud Security
Return of Watchbog: Exploiting Jenkins CVE-2018-1000861
2019-05-02Medium SebdravenSébastien Larinier
Goblin Panda continues to target Vietnam
NewCore RAT
2019-04-26Bleeping ComputerLawrence Abrams
A Closer Look at the RobbinHood Ransomware
RobinHood
2019-04-16BitdefenderAndrei Ardelean, Bogdan Botezatu, Cristofor Ochinca
Inside Scranos – A Cross Platform, Rootkit-Enabled Spyware Operation
Scranos
2019-04-10Kaspersky LabsKaspersky Team
The Gaza cybergang and its SneakyPastes campaign
Molerats
2019-04-05Medium vishal_thakurVishal Thakur
Trickbot — a concise treatise
TrickBot
2019-03-12Palo Alto Networks Unit 42Unit 42
Operation Comando: How to Run a Cheap and Effective Credit Card Business
Operation Comando
2019-03-04FireEyeBen Read, Fred Plan, Jacqueline O’Leary, Nalani Fraser, Vincent Cannon
APT40: Examining a China-Nexus Espionage Actor
LunchMoney APT40