Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-02-13Bleeping ComputerLawrence Abrams
Parallax RAT: Common Malware Payload After Hacker Forums Promotion
Parallax RAT
2020-02-13TalosEdmund Brumaghin, Nick Biasini
Threat actors attempt to capitalize on coronavirus outbreak
Emotet Nanocore RAT Parallax RAT
2020-02-13CybereasonCybereason Nocturnus
New Cyber Espionage Campaigns Targeting Palestinians - Part 2: The Discovery of the New, Mysterious Pierogi Backdoor
Pierogi
2020-02-12McAfeeChristiaan Beek
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part I
FriedEx
2020-02-12VMWare Carbon BlackAC, Rachel E. King
Ryuk Ransomware Technical Analysis
Ryuk
2020-02-12Twitter (@DrStache_)DrStache
Tweet on ManaBotnet
Azorult
2020-02-10BitdefenderMichael Rosen
Hypervisor Introspection Thwarts Web Memory Corruption Attack in the Wild
coldbrew
2020-02-10viXraJason Reaves
A Case Study into solving Crypters/Packers in Malware Obfuscation using an SMT approach
Locky
2020-02-10Kaspersky LabsAnna Malina
KBOT: sometimes they come back
Bolek
2020-02-10ZDNetCatalin Cimpanu
FBI warns about ongoing attacks against software supply chain companies
DistTrack Kwampirs
2020-02-07Bleeping ComputerSergiu Gatlan
TA505 Hackers Behind Maastricht University Ransomware Attack
Clop
2020-02-07RiskIQJordan Herman
Magecart Group 12’s Latest: Actors Behind Attacks on Olympics Ticket Re-sellers Deftly Swapped Domains to Continue Campaign
magecart
2020-02-05CybereasonAssaf Dahan, Lior Rochberger
The Hole in the Bucket: Attackers Abuse Bitbucket to Deliver an Arsenal of Malware
Amadey Azorult Predator The Thief STOP Vidar
2020-02-040x00secDan Lisichkin
Analyzing Modern Malware Techniques - Part 3: A case of Powershell, Excel 4 Macros and VB6
2020-02-02ESET ResearchIgnacio Sanmillan, Marc-Etienne M.Léveillé
TLP: WHITE A WILD KOBALOS APPEARSTricksy Linux malware goes after HPCs
Kobalos
2020-02-02Sophos LabsMarkel Picado, Sean Gallagher
Agent Tesla amps up information stealing attacks
Agent Tesla
2020-02-02Youtube (Ghidra Ninja)Ghidra Ninja
Reversing WannaCry Part 2 - Diving into the malware with #Ghidra
WannaCryptor
2020-01-31ReversingLabsRobert Simmons
RATs in the Library: Remote Access Trojans Hide in Plain "Public" Site
CyberGate LimeRAT NjRAT Quasar RAT Revenge RAT
2020-01-31Virus BulletinMichal Poslušný, Peter Kálnai
Rich Headers: leveraging this mysterious artifact of the PE format
Dridex Exaramel Industroyer Neutrino RCS Sathurbot
2020-01-31TagesschauJan Lukas Strozyk
Deutsches Chemieunternehmen gehackt
Winnti