Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-08-09IntrusiontruthIntrusiontruth
More on Huaying Haitai and Laoying Baichaun, the companies associated with APT10. Is there a state connection?
2018-06-06GuardicoreDaniel Goldberg, Mor Matal, Ofri Ziv
Operation Prowli: Monetizing 40,000 Victim Machines
r2r2
2018-05-22ESET ResearchESET Research
Turla Mosquito: A shift towards more generic tools
Mosquito Turla
2018-04-24FireEyeEdson Sierra, Gerardo Iglesias
Metamorfo Campaigns Targeting Brazilian Users
Metamorfo
2018-03-28IntezerJay Rosenberg
Lazarus Group Targets More Cryptocurrency Exchanges and FinTech Companies
Unidentified 042
2018-03-26PhishLabsCrane Hassold
Silent Librarian: More to the Story of the Iranian Mabna Institute Indictment
Silent Librarian
2018-03-13Kaspersky LabsDenis Makrushin, Yury Namestnikov
Time of death? A therapeutic postmortem of connected medicine
PlugX
2018-03-08McAfeeAsheer Malhotra, Charles Crawford, Jessica Saavedra-Morales, Ryan Sherstobitoff
Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant
Lazarus Group
2018-03-02McAfeeAsheer Malhotra, Jessica Saavedra-Morales, Ryan Sherstobitoff, Thomas Roccia
McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups
Syscon
2018-02-26Secure coding and more blogAntonio Parata
Analyzing the nasty .NET protection of the Ploutus.D malware
Ploutus ATM
2018-02-15SecurityIntelligenceLimor Kessem, Magal Baz, Ophir Harpaz
TrickBot’s Cryptocurrency Hunger: Tricking the Bitcoin Out of Wallets
TrickBot
2018-02-12McAfeeAsheer Malhotra, Jessica Saavedra-Morales, Ryan Sherstobitoff, Thomas Roccia
Lazarus Resurfaces, Targets Global Banks and Bitcoin Users
CoreDN
2018-01-24Trend MicroCH Lei, Fyodor Yarochkin, Lenart Bermejo, Philippe Z Lin, Razor Huang
Lazarus Campaign Targeting Cryptocurrencies Reveals Remote Controller Tool, an Evolved RATANKBA, and More
PowerRatankba
2017-12-20CrowdStrikeAdam Kozy
An End to “Smash-and-Grab” and a Move to More Targeted Approaches
CHINACHOPPER
2017-11-24Bleeping ComputerCatalin Cimpanu
Mirai Activity Picks up Once More After Publication of PoC Exploit Code
Mirai
2017-11-13SecurityIntelligenceLimor Kessem, Maor Wiesen, Tal Darsan, Tomer Agayev
New Banking Trojan IcedID Discovered by IBM X-Force Research
IcedID IcedID Downloader
2017-11-08SecurityIntelligenceGadi Ostrovsky, Limor Kessem
Overlay RAT Malware Uses AutoIt Scripting to Bypass Antivirus Detection
Overlay RAT
2017-10-27BellingcatCollin Anderson
Bahamut Revisited, More Cyber Espionage in the Middle East and South Asia
Bahamut Bahamut Bahamut
2017-10-26FireEyeBarry Vengerik, Ben Read, Brian Mordosky, Christopher Glyer, Ian Ahl, Matt Williams, Michael Matonis, Nick Carr
BACKSWING - Pulling a BADRABBIT Out of a Hat
EternalPetya
2017-10-13MorphisecMichael Gorelik
FIN7 Dissected: Hackers Accelerate Pace of Innovation
FIN7