Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-02-21GitHub (RolfRolles)Rolf Rolles
FinSpyVM (Static Unpacker for FinSpyVM)
FinFisher RAT
2018-02-21Möbius Strip Reverse EngineeringRolf Rolles
FinSpy VM Unpacking Tutorial Part 3: Devirtualization
FinFisher RAT
2018-02-21AvastThreat Intelligence Team
Avast tracks down Tempting Cedar Spyware
TemptingCedar Spyware
2018-02-20Kaspersky LabsGReAT
A Slice of 2017 Sofacy Activity
X-Agent Seduploader X-Agent Zebrocy Zebrocy (AutoIT) APT28
2018-02-20FireEyeFireEye
APT37 (REAPER) The Overlooked North Korean Actor
PoorWeb RokRAT APT37
2018-02-20Joe Security's BlogJoe Security
Latest Elise APT comes packed with Sandbox Evasions
Elise
2018-02-20FireEyeFireEye
APT37 (Reaper): The Overlooked North Korean Actor
APT37
2018-02-19ActionDan
Intro to Using GScript for Red Teams
Merlin
2018-02-16FortinetXiaopeng Zhang
New jRAT/Adwind Variant Being Spread With Package Delivery Scam
AdWind
2018-02-12McAfeeAsheer Malhotra, Jessica Saavedra-Morales, Ryan Sherstobitoff, Thomas Roccia
Lazarus Resurfaces, Targets Global Banks and Bitcoin Users
CoreDN
2018-02-09ExaTrackStéfan Le Berre
Hey Uroburos! What's up ?
Uroburos
2018-02-09Bleeping ComputerLawrence Abrams
Black Ruby Ransomware Skips Victims in Iran and Adds a Miner for Good Measure
Blackruby
2018-02-09Bleeping ComputerLawrence Abrams
DexCrypt MBRLocker Demands 30 Yuan To Gain Access to Computer
MBRlock
2018-02-08LockboxxAction Dan
Merlin for Red Teams
Merlin
2018-02-07Palo Alto Networks Unit 42Brad Duncan, Vicky Ray
Compromised Servers & Fraud Accounts: Recent Hancitor Attacks
Hancitor
2018-02-07TalosMartin Lee, Paul Rascagnères
Targeted Attacks In The Middle East
Operation Parliament
2018-02-05US-CERTUnknown Unknown
HIDDEN COBRA - North Korean Malicious Cyber Activity
HARDRAIN HARDRAIN
2018-02-05Patrick Wardle
Analyzing OSX/CreativeUpdater a macOS cryptominer, distributed via macupdate.com
CreativeUpdater
2018-02-03FireEyeFireEye
Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and Recommendations
TEMP.Hermit
2018-02-02McAfeeRyan Sherstobitoff
Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems
Running RAT