Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-03-21DomainToolsDomainTools
Hunt Case Study: Hunting Campaign Indicators on Privacy Protected Attack Infrastructure
CopyKittens
2017-03-21WiredGarrett M. Graff
Inside the Hunt for Russia's Most Notorious Hacker
Gameover P2P
2017-02-26Arnaud Delmas
TreasureHunter : A POS Malware Case Study
TreasureHunter
2017-02-24Some stuff about security.. BlogAngel Alonso
Hunting Retefe with Splunk - some interesting points
Retefe
2016-11-09Twitter (MalwareHunterTeam)MalwareHunterTeam
Tweet on Bandok
2016-10-20Twitter (@malwrhunterteam)MalwareHunterTeam
Tweet on Ransomware
Unidentified 024 (Ransomware)
2016-10-20Twitter (@malwrhunterteam)MalwareHunterTeam
Tweet on Quasar RAT
Quasar RAT
2016-04-26MicrosoftWindows Defender Advanced Threat Hunting Team
PLATINUM Targeted attacks in South and Southeast Asia
AMTsol PLATINUM
2016-03-28FireEyeNart Villeneuve
TREASUREHUNT: A Custom POS Malware Tool
TreasureHunter
2015-06-23ReutersJoseph Menn, Sarah N. Lynch
Exclusive: SEC hunts hackers who stole corporate emails to trade stocks
WOLF SPIDER
2015-01-26CrowdStrikeAndy Schworer, Josh Liburdi
Storm Chasing: Hunting Hurricane Panda
HURRICANE PANDA
2014-11-14SensepostEtienne Stalmans, Sam Hunter, Willem Mouton
reGeorg
reGeorg
2014-09-05GoogleBilly Leonard, Neel Mehta, Shane Huntiey
Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family
X-Agent
2014-08-14Palo Alto Networks Unit 42Unit 42 Team
Hunting the Mutex
Allaple
2014-06-23F-SecureDaavid
Havex Hunts For ICS/SCADA Systems
Havex RAT
2014-05-01Recorded FutureChris
Hunting Hidden Lynx: How OSINT is Crucial for APT Analysis
APT17
2011-07-04Kernelmode.info Forumsrkhunter
WinNT/Rovnix (alias Mayachok, Cidox, BkLoader)
Rovnix
2011-03-28KrebsOnSecurityBrian Krebs
Microsoft Hunting Rustock Controllers
Rustock