Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-07-21YouTube ( OPCDE with Matt Suiche)Mohamad Mokbel
vOPCDE #9 - A Journey into Malware HTTP Communication Channels Spectacles (Mohamad Mokbel)
Alureon Aytoke Cobra Carbon System CROSSWALK danbot ProtonBot Silence
2020-07-21ViceLorenzo Franceschi-Bicchierai
'World's Most Wanted Man' Involved in Bizarre Attempt to Buy Hacking Tools
RCS
2020-07-20Dr.WebDr.Web
Study of the APT attacks on state institutions in Kazakhstan and Kyrgyzstan
Microcin Mirage PlugX WhiteBird
2020-07-20HornetsecurityHornetsecurity Security Lab
Emotet is back
Emotet
2020-07-20Bleeping ComputerLawrence Abrams
Emotet-TrickBot malware duo is back infecting Windows machines
Emotet TrickBot
2020-07-17ZscalerKaivalya Khursale, Sudeep Singh
New Voicemail-Themed Phishing Attacks Use Evasion Techniques and Steal Credentials
2020-07-16NCSC UKNCSC UK
Advisory: APT29 targets COVID-19 vaccine development
WellMail elf.wellmess SoreFang WellMess
2020-07-16PWC UKPWC UK
How WellMess malware has been used to target Covid-19 vaccines
elf.wellmess WellMess
2020-07-16WiredAndy Greenberg
Iranian Spies Accidentally Leaked Videos of Themselves Hacking
2020-07-16ESET ResearchMarc-Etienne M.Léveillé
Mac cryptocurrency trading application rebranded, bundled with malware
Gmera
2020-07-16ESET ResearchAmer Owaida
High‑profile Twitter accounts hacked to promote Bitcoin scam
2020-07-15MandiantCorey Hildebrandt, Daniel Kapellmann Zafra, Keith Lunden, Ken Proska, Nathan Brubaker
Financially Motivated Actors Are Expanding Access Into OT: Analysis of Kill Lists That Include OT Processes Used With Seven Malware Families
Clop DoppelPaymer LockerGoga Maze MegaCortex Nefilim Snake
2020-07-15RelativityBartlomiej Czyż
An in-depth analysis of SpyNote remote access trojan
SpyNote
2020-07-15ZDNetCatalin Cimpanu
Chinese state hackers target Hong Kong Catholic Church
PlugX
2020-07-15Yahoo NewsJenna McLaughlin, Kim Zetter, Sean D. Naylor, Zach Dorfman
Exclusive: Secret Trump order gives CIA more powers to launch cyberattacks
2020-07-15Advanced IntelligenceSamantha van de Ven, Yelisey Boguslavskiy
Inside REvil Extortionist “Machine”: Predictive Insights
Gandcrab REvil
2020-07-15Johannes Bader's BlogJohannes Bader
The Defective Domain Generation Algorithm of BazarBackdoor
BazarBackdoor
2020-07-14Cyborg SecurityAustin Jackson
PYTHON MALWARE ON THE RISE
Poet RAT PyLocky SEADADDY
2020-07-14CrowdStrikeFalcon OverWatch Team
Manufacturing Industry in the Adversaries’ Crosshairs
ShadowPad Snake
2020-07-14Johannes Bader's BlogJohannes Bader
The Domain Generation Algorithm of BazarBackdoor
BazarBackdoor