Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-05-08Trend MicroRaphael Centeno
Dharma Ransomware Uses AV Tool to Distract from Malicious Activities
Dharma
2019-05-08Kaspersky LabsFélix Aime, Yury Namestnikov
FIN7.5: the infamous cybercrime rig “FIN7” continues its activities
Griffon Ave Maria FIN7
2019-05-07SymantecSecurity Response Attack Investigation Team
Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak
DoublePulsar
2019-05-07SANS ISC InfoSec ForumsRenato
Vulnerable Apache Jenkins exploited in the wild
kerberods
2019-05-07Trend MicroTrendmicro
MegaCortex Ransomware Spotted Attacking Enterprise Networks
MegaCortex
2019-05-05Youtube (LiveOverflow)LiveOverflow, Sean Wilson, Sergei Frankoff
Unpacking Redaman Malware & Basics of Self-Injection Packers - ft. OALabs
RTM
2019-05-05GoggleHeadedHacker BlogJacob Pimental
Unpacking NanoCore Sample Using AutoIT
Nanocore RAT
2019-05-03Trend MicroJoseph C Chen
Mirrorthief Group Uses Magecart Skimming Attack to Hit Hundreds of Campus Online Stores in US and Canada
magecart
2019-05-03SophosAndrew Brandt
“MegaCortex” ransomware wants to be The One
MegaCortex
2019-05-01Felix Weyne
Hancitor's Packer Damystified
Hancitor
2019-05-01ClearSkyClearSky Research Team
Iranian Nation-State APT Groups 'Black Box' Leak
[Unnamed group]
2019-04-30Council on Foreign RelationsCyber Operations Tracker
APT 40
APT40
2019-04-30ESET ResearchESET Research
Buhtrap backdoor and Buran ransomware distributed via major advertising platform
Buhtrap ClipBanker RTM
2019-04-25DATANETKim Seon-ae
Chinese-based hackers attack domestic energy institutions
CALMTHORN Ghost RAT
2019-04-25CybereasonCybereason Nocturnus
Threat Actor TA505 Targets Financial Enterprises Using LOLBins and a New Backdoor Malware
ServHelper TA505
2019-04-24WeixinTencent
"Sea Lotus" APT organization's attack techniques against China in the first quarter of 2019 revealed
Cobalt Strike SOUNDBITE
2019-04-24SymantecSymantec Response Attack Investigation Team
Beapy: Cryptojacking Worm Hits Enterprises in China
Beapy
2019-04-24SpecterOpsRichie Cyrus
Introducing Venator: A macOS tool for proactive detection
AppleJeus WindTail
2019-04-24FireEyeJames T. Bennett, Michael Bailey
CARBANAK Week Part Three: Behind the CARBANAK Backdoor
Carbanak
2019-04-23Kaspersky LabsAMR, GReAT
Operation ShadowHammer: a high-profile supply chain attack
shadowhammer ShadowPad