Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-05-16Cado SecurityChris Doman, James Campbell
Recent Attacks Against Supercomputers
Loerbas
2020-05-15SentinelOnePhil Stokes
A Guide to macOS Threat Hunting and Incident Response
2020-05-15MalwareLab.plMaciej Kotowicz
In depth analysis of Lazarus validator
2020-05-15Twitter (@nunohaien)Tillmann Werner
Twitter Thread on attacks on high-performance computing labs
Loerbas
2020-05-14Avast DecodedLuigino Camastra
APT Group Planted Backdoors Targeting High Profile Networks in Central Asia
BYEBY Ghost RAT Microcin MimiKatz Vicious Panda
2020-05-14ESET ResearchPeter Kálnai
Mikroceen: Spying backdoor leveraged in high‑profile networks in Central Asia
Microcin Vicious Panda
2020-05-14paloalto Networks Unit 42Ruchna Nigam
Mirai and Hoaxcalls Botnets Target Legacy Symantec Web Gateways
Bashlite Mirai
2020-05-14SophosLabsMarkel Picado
RATicate: an attacker’s waves of information-stealing malware
Agent Tesla BetaBot BlackRemote Formbook Loki Password Stealer (PWS) NetWire RC NjRAT Remcos
2020-05-14360 Total Securitykate
Vendetta - new threat actor from Europe
Nanocore RAT Remcos
2020-05-14TelekomThomas Barabosch
LOLSnif – Tracking Another Ursnif-Based Targeted Campaign
LOLSnif
2020-05-14ESET ResearchPeter Kálnai
Mikroceen: Spying backdoor leveraged in high‑profile networks in Central Asia
BYEBY Microcin
2020-05-14Avast DecodedLuigino Camastra
APT Group Planted Backdoors Targeting High Profile Networks in Central Asia
BYEBY Microcin
2020-05-13KELARaveed Laeb
Access-as-a-Service – Remote Access Markets in the Cybercrime Underground
2020-05-13BitdefenderLiviu Arsene
Global Ransomware and Cyberattacks on Healthcare Spike during Pandemic
2020-05-13Malpedia
Malpedia Family Page for Kiralock (Placeholder)
2020-05-13ESET ResearchIgnacio Sanmillan
Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks
Ramsay Retro
2020-05-12Yet Another Security BlogMichael Weber
Evading Detection with Excel 4.0 Macros and the BIFF8 XLS Format
Zloader
2020-05-12FireEyeJacob Thompson
Analyzing Dark Crystal RAT, a C# backdoor
DCRat
2020-05-12Trend MicroJoey Chen
Tropic Trooper’s Back: USBferry Attack Targets Air-gapped Environments (Technical Brief)
USBferry
2020-05-12Trend MicroJoey Chen
Tropic Trooper’s Back: USBferry Attack Targets Air-gapped Environments
USBferry