Click here to download all references as Bib-File.•
2017-08-30
⋅
ESET Research
⋅
New ESET research uncovers Gazer, the stealthy backdoor that spies on embassies Gazer |
2017-08-28
⋅
ClearSky
⋅
Recent ISMAgent Samples and Infrastructure by Iranian Threat Group GreenBug ISMAgent |
2017-08-18
⋅
vmware
⋅
Threat Analysis: Carbon Black Threat Research Dissects PNG Dropper Uroburos |
2017-07-27
⋅
Secureworks
⋅
The Curious Case of Mia Ash: Fake Persona Lures Middle Eastern Targets Cleaver |
2017-07-25
⋅
ClearSky
⋅
Operation Wilted Tulip – Exposing a Cyber Espionage Apparatus Matryoshka RAT TDTESS CopyKittens |
2017-07-25
⋅
Gigamon
⋅
Footprints of Fin7: Tracking Actor Patterns (Part 1) FIN7 |
2017-06-29
⋅
Microsoft
⋅
Windows 10 platform resilience against the Petya ransomware attack EternalPetya |
2017-06-27
⋅
Microsoft
⋅
New ransomware, old techniques: Petya adds worm capabilities Petya |
2017-06-27
⋅
Secureworks
⋅
BRONZE UNION Cyberespionage Persists Despite Disclosures APT27 |
2017-06-14
⋅
ThreatConnect
⋅
Phantom of the Opaera: New KASPERAGENT Malware Campaign KasperAgent AridViper |
2017-06-13
⋅
Cylance
⋅
Threat Spotlight: Breaking Down FF-Rat Malware FormerFirstRAT |
2017-06-07
⋅
Microsoft
⋅
PLATINUM continues to evolve, find ways to maintain invisibility AMTsol |
2017-05-23
⋅
ThreatVector
⋅
Quakbot QakBot |
2017-05-09
⋅
VMWare Carbon Black
⋅
Carbon Black Threat Research Dissects Red Leaves Malware, Which Leverages DLL Side Loading RedLeaves |
2017-05-02
⋅
Cylance
⋅
Philadelphia Ransomware |
2017-04-13
⋅
A blog about rootkits research and the Windows kernel
⋅
Stuxnet drivers: detailed analysis Stuxnet |
2017-03-30
⋅
ClearSky
⋅
Jerusalem Post and other Israeli websites compromised by Iranian threat agent CopyKitten CopyKittens |
2017-03-28
⋅
Cylance
⋅
Threat Spotlight: GhostAdmin Malware GhostAdmin |
2017-03-27
⋅
Microsoft
⋅
Detecting and mitigating elevation-of-privilege exploit for CVE-2017-0005 APT31 |
2017-03-22
⋅
Cylance
⋅
El Machete's Malware Attacks Cut Through LATAM Machete El Machete |