Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-08-28CylanceCylance Threat Research Team
Inside the APT28 DLL Backdoor Blitz
PocoDown
2019-08-27Cisco TalosPaul Rascagnères, Vanja Svajcer
China Chopper still active 9 years later
CHINACHOPPER
2019-08-23The New York TimesDavid E. Sanger, Manny Fernandez, Marina Trahan Martinez
Ransomware Attacks Are Testing Resolve of Cities Across America
REvil
2019-08-22Trend MicroIan Mercado, Mhica Romero
Asruex Backdoor Variant Infects Word Documents and PDFs Through Old MS Office and Adobe Vulnerabilities
Asruex
2019-08-22Youtube (OALabs)Sergei Frankoff
Remcos RAT Unpacked From VB6 With x64dbg Debugger
Remcos
2019-08-21ThreatgenPascal Ackerman
Taking a Closer Look at the LookBack Malware Campaign – Part 1
Lookback
2019-08-19EST SecurityEast Security Response Center
Konni APT organization emerges as an attack disguised as Russian document
Konni
2019-08-15Malwarebyteshasherezade
The Hidden Bee infection chain, part 1: the stegano pack
Hidden Bee
2019-08-12Kaspersky LabsGReAT
Recent Cloud Atlas activity
PowerShower Inception Framework
2019-08-12Kaspersky SASMaddie Stone
Chamois: Android's Most Impactful Botnet of 2018
Chamois
2019-08-12Kaspersky LabsGReAT
Recent Cloud Atlas activity
PowerShower
2019-08-08BlackHatEric Doerr
The Enemy Within: Modern Supply Chain Attacks
VPNFilter
2019-08-07FireEyeChi-en Shen, Dan Perez, Fred Plan, Jacqueline O’Leary, Nalani Fraser, Raymond Leong, Vincent Cannon
APT41: A Dual Espionage and Cyber Crime Operation
APT41
2019-08-05ThreatpostTara Seals
MegaCortex Ransomware Revamps for Mass Distribution
MegaCortex
2019-08-05ESET ResearchESET Research
Sharpening the Machete
Machete
2019-08-01Group-IBGroup-IB
Attacks by Silence
Silence DDoS Kikothac Silence
2019-08-01ProofpointDennis Schwarz, Michael Raggi, Proofpoint Threat Insight Team
LookBack Malware Targets the United States Utilities Sector with Phishing Attacks Impersonating Engineering Licensing Boards
GUP Proxy Tool Lookback TA410
2019-07-30int 0xcc blogRaashid Bhat
Practical Threat Hunting and Incidence Response : A Case of A Pony Malware Infection
Pony
2019-07-29ESET ResearchLukáš Štefanko
Android ransomware is back
FileCoder
2019-07-28Dissecting MalwareMarius Genheimer
Third time's the charm? Analysing WannaCry samples
WannaCryptor