Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-01-01MITREMITRE ATT&CK
Tool description: China Chopper
CHINACHOPPER
2018-12-02Check PointCheck Point Research
The Ransomware Doctor Without A Cure
Dharma
2018-11-01Trend MicroTrendmicro
Perl-Based Shellbot Looks to Target Organizations via C&C
Haiduc PerlBot
2018-10-01SANS Cyber SummitAndrea Carcano
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems, Forever
Triton
2018-09-10Trend MicroIan Kenefick
A Closer Look at the Locky Poser, PyLocky Ransomware
PyLocky
2018-09-02Möbius Strip Reverse EngineeringRolf Rolles
Weekend Project: A Custom IDA Loader Module For The Hidden Bee Malware Family
Hidden Bee
2018-08-30Malwarebyteshasherezade
Reversing malware in a custom format: Hidden Bee elements
Hidden Bee
2018-08-08Nozomi NetworksAlessandro Di Pinto, Andrea Carcano, Younes Dragoni
TRITON: The First ICS Cyber Attack on Safety Instrument Systems
Triton
2018-08-07Dr.WebDr.Web
Doctor Web discovered a clipper Trojan for Android
Clipper
2018-06-15Bleeping ComputerCatalin Cimpanu
Chinese Cyber-Espionage Group Hacked Government Data Center
APT27
2018-06-13ThreatpostTara Seals
Banco de Chile Wiper Attack Just a Cover for $10M SWIFT Heist
Lazarus Group
2018-06-13Kaspersky LabsDenis Legezo
LuckyMouse hits national data center to organize country-level waterholing campaign
HyperBro APT27
2018-05-17Minerva LabsGal Bitensky
Analyzing an AZORult Attack – Evasion in a Cloak of Multiple Layers
Azorult
2018-04-13NewSky SecurityNewSky Security
Understanding the IoT Hacker — A Conversation With Owari/Sora IoT Botnet Author
Owari
2018-03-30Trend MicroDavid Sancho, Massimiliano Michenz, Numaan Huq
Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types
Project Alice ATMitch Ploutus ATM Ripper ATM Skimer SUCEFUL Tyupkin
2018-02-01BitdefenderBogdan Botezatu, Ivona Alexandra Chili
Operation PZChao: a possible return of the Iron Tiger APT
APT27
2018-01-24Objective-SeePatrick Wardle
Analyzing CrossRAT: A cross-platform implant, utilized in a global cyber-espionage campaign
CrossRAT
2018-01-17Malwarebyteshasherezade
A coin miner with a “Heaven’s Gate”
Coinminer
2018-01-13The Washington PostEllen Nakashima
Russian military was behind ‘NotPetya’ cyberattack in Ukraine, CIA concludes
EternalPetya
2018-01-12StormshieldRémi Jullian
Analyzing an Agent Tesla campaign: from a word document to the attacker credentials
Agent Tesla