Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-21Github (trendmicro)Trend Micro Research
Python script to check a Cyclops Blink C&C
CyclopsBlink
2022-03-17TrendmicroFeike Hacquebord, Fernando Mercês, Stephen Hilt
Cyclops Blink Sets Sights on Asus Routers (Appendix)
CyclopsBlink
2022-03-17TrendmicroFeike Hacquebord, Fernando Mercês, Stephen Hilt
Cyclops Blink Sets Sights on Asus Routers
CyclopsBlink
2022-03-09TrendmicroDon Ovid Ladores
New Nokoyawa Ransomware Possibly Related to Hive
Nokoyawa Ransomware
2021-05-04Twitter (@TrendMicroRSRCH)Trend Micro Research
Tweet on N3tw0rm ransomware, that has started affecting users in Israel.
Pay2Key
2020-12-22Maple Bacon CTF Team at the University of British ColumbiaArctic Wyvern
[TrendMicro CTF 2020 Finals] Wildcard-2: Yara exfiltration
2020-11-16Trend MicroTrendmicro
Malicious Actors Target Comm Apps such as Zoom, Slack, Discord
WebMonitor RAT
2019-05-07Trend MicroTrendmicro
MegaCortex Ransomware Spotted Attacking Enterprise Networks
MegaCortex
2019-04-25Trend MicroTrendmicro
Emotet Adds New Evasion Technique
Emotet
2019-03-25Trend MicroTrendmicro
Emerging Threat on RANSOM_CRYPTESLA
TeslaCrypt
2018-12-18Trend MicroTrendmicro
URSNIF, EMOTET, DRIDEX and BitPaymer Gangs Linked by a Similar Loader
Dridex Emotet FriedEx ISFB
2018-11-01Trend MicroTrendmicro
Perl-Based Shellbot Looks to Target Organizations via C&C
Haiduc PerlBot
2018-06-28Trend MicroTrendmicro
The New Face of Necurs: Noteworthy Changes to Necurs’ Behaviors
Necurs
2018-03-27Trend MicroTrendmicro
Evolving Trickbot Adds Detection Evasion and Screen-Locking Features
TrickBot
2018-01-24Trend MicroTrendmicro
A Look into the Lazarus Group’s Operations
Lazarus Group
2017-11-07Trend MicroTrendmicro
REDBALDKNIGHT/BRONZE BUTLER’s Daserf Backdoor Now Using Steganography
Daserf Datper xxmm
2017-06-29Trend MicroTrendmicro
Information Stealer Found Hitting Israeli Hospitals
Retadup
2017-04-19Trend MicroTrendmicro
Of Pigs and Malware: Examining a Possible Member of the Winnti Group
Winnti
2015-09-17Trend MicroTrendmicro
Operation Iron Tiger: Exploring Chinese Cyber-Espionage Attacks on United States Defense Contractors
APT27
2015-02-18Trend MicroTrendmicro
Sexually Explicit Material Used as Lures in Recent Cyber Attacks
AridViper
2014-09-03Trend MicroTrendmicro
ALDIBOT
Aldibot