Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-12-12Trend MicroCedric Pernet, Feike Hacquebord, Kenney Lu
More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting
APT33
2019-12-11Bleeping ComputerLawrence Abrams
Maze Ransomware Behind Pensacola Cyberattack, $1M Ransom Demand
Maze
2019-12-10ConfiantTaha Karim
New macOS Bundlore Loader Analysis
Bundlore
2019-12-09Palo Alto Networks Unit 42Brittany Ash, Bryan Lee, Mike Harbison
TrickBot Campaign Uses Fake Payroll Emails to Conduct Phishing Attacks
TrickBot
2019-12-05Github (blackorbird)blackorbird
APT32 Report
Cobalt Strike
2019-12-05Marco Ramilli's BlogMarco Ramilli
APT28 Attacks Evolution
APT28
2019-12-04Kaspersky LabsDavid Emm
APT review: what the world’s threat actors got up to in 2019
ShaggyPanther
2019-12-04Palo Alto Networks Unit 42Robert Falcone
xHunt Campaign: xHunt Actor’s Cheat Sheet
2019-12-04WeixinGcow Security Team
Tentacles reaching Central Asia: analysis of Uzbekistan activities by DustSquad APT
Octopus
2019-12-04ProofpointAxel F, Dennis Schwarz, Kafeine, Kelsey Merriman
Buer, a new loader emerges in the underground marketplace
Buer
2019-12-03NSHCRed Alert
THREAT ACTOR TARGETING HONG KONG PRO-DEMOCRACY FIGURES
APT31
2019-12-03SecFreaksSecFreaks
In depth analysis of an infostealer: Raccoon
Raccoon
2019-12-03NSHCNSHC Threatrecon Team
Threat Actor Targeting Hong Kong Pro-Democracy Figures
sihost
2019-12-02Bleeping ComputerLawrence Abrams
Facebook Ads Manager Targeted by New Info-Stealing Trojan
Socelars
2019-12-02CylanceRyan Tracey
Meet PyXie: A Nefarious New Python RAT
PyXie
2019-11-29Trend MicroHiroyuki Kakara, Joey Chen, Masaoki Shoji
Operation ENDTRADE:TICK: 2019s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data
BROLER
2019-11-29Palo Alto Networks Unit 42Josh Grunzweig, Kyle Wilhoit
The Fractured Block Campaign: CARROTBAT Used to Deliver Malware Targeting Southeast Asia
CarrotBat
2019-11-29Trend MicroHiroyuki Kakara, Joey Chen, Masaoki Shoji
Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK
Datper Lilith
2019-11-27ThreatVectorAdam Martin
Threat Spotlight: Machete Info-Stealer
Machete
2019-11-26ESET ResearchVladislav Hrčka
Stantinko botnet adds cryptomining to its pool of criminal activities
Stantinko