Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-03-15CofenseThreat Intelligence
Flash Bulletin: Emotet Epoch 1 Changes its C2 Communication
Emotet
2019-02-26TencentTencent Yujian Threat Intelligence Center
Disclosure of SideWinder APT's attack against South Asia
SideWinder RAZOR TIGER
2019-02-18360 Threat IntelligenceAnxin Threat Intelligence Center
APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations
Imminent Monitor RAT APT-C-36
2019-02-16AvastThreat Intelligence Team
Spoofing in the reeds with Rietspoof
Rietspoof
2018-12-12360 Threat IntelligenceQi Anxin Threat Intelligence Center
Donot (APT-C-35) Group Is Targeting Pakistani Businessman Working In China
VICEROY TIGER
2018-11-29360 Threat IntelligenceThreat Intelligence Center
Analysis Of Targeted Attack Against Pakistan By Exploiting InPage Vulnerability And Related APT Groups
BioData Bitter RAT WSCSPL
2018-11-29360 Threat IntelligenceQi Anxin Threat Intelligence Center
Analysis Of Targeted Attack Against Pakistan By Exploiting InPage Vulnerability And Related APT Groups
Artra Downloader
2018-09-27AvastThreat Intelligence Team
Torii botnet - Not another Mirai variant
Torii
2018-07-23360 Threat IntelligenceQi Anxin Threat Intelligence Center
Golden Rat Organization-targeted attack in Syria
NjRAT APT-C-27
2018-07-12360 Threat Intelligence360
Blue Pork Mushroom (APT-C-12) targeted attack technical details revealed
APT-C-12
2018-05-23TencentTencent Mimi Threat Intelligence Center
SideWinder“响尾蛇”APT组织(T-APT-04):针对南亚的定向攻击威胁
SideWinder RAZOR TIGER
2018-03-30360 Threat IntelligenceQi Anxin Threat Intelligence Center
Analysis of the latest cyber attack activity of the APT organization against sensitive institutions in China
Quasar RAT
2018-03-08AvastThreat Intelligence Team
New investigations into the CCleaner incident point to a possible third stage that had keylogger capacities
CCleaner Backdoor
2018-02-21AvastThreat Intelligence Team
Avast tracks down Tempting Cedar Spyware
TemptingCedar Spyware
2018-01-01FireEyeFireEye
The Forrester New Wave™: External Threat Intelligence Services, Q3 2018.
APT1
2017-09-25AvastThreat Intelligence Team
Additional information regarding the recent CCleaner APT security incident
CCleaner Backdoor
2017-09-21AvastThreat Intelligence Team
Avast Threat Labs analysis of CCleaner incident
CCleaner Backdoor
2017-07-17MalwarebytesThreat Intelligence Team
It’s baaaack: Public cyber enemy Emotet has returned
Emotet
2016-09-20AvastThreat Intelligence Team
Inside Petya and Mischa ransomware
Petya
2016-09-14DeloitteDeloitte
The evolution of the Nymaim Criminal Enterprise Threat Intelligence & Analytics
Nymaim
2016-04-06AvastThreat Intelligence Team
Andromeda under the microscope
Andromeda
2016-01-28FireEyeFireEye Threat Intelligence
CenterPOS: An Evolving POS Threat
CenterPOS
2015-12-21FireEyeFireEye Threat Intelligence, Ryann Winters
The EPS Awakens - Part 2
ELMER IRONHALO EvilPost
2015-12-01FireEyeFireEye Threat Intelligence
China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets
BUBBLEWRAP LOWBALL TEMPER PANDA
2015-08-17F-Secure LabsF-Secure Threat Intelligence Team, Noora Hyvärinen
THE DUKES 7 YEARS OF RUSSIAN CYBERESPIONAGE
COZYDUKE GeminiDuke
2015-07-01FireEyeFireEye Threat Intelligence
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group
tDiscoverer APT29
2014-05-01Arbor NetworksASERT Threat Intelligence
Into the Light of Day:Uncovering Ongoing and Historical Point of Sale Malware and Attack Campaigns
poscardstealer
2013-05-20AvastThreat Intelligence Team
Lockscreen Win32:Lyposit displayed as a fake MacOs app
Lyposit