Click here to download all references as Bib-File.•
2019-08-28
⋅
Cylance
⋅
Inside the APT28 DLL Backdoor Blitz PocoDown |
2019-08-27
⋅
Cisco Talos
⋅
China Chopper still active 9 years later CHINACHOPPER |
2019-08-23
⋅
The New York Times
⋅
Ransomware Attacks Are Testing Resolve of Cities Across America REvil |
2019-08-22
⋅
Trend Micro
⋅
Asruex Backdoor Variant Infects Word Documents and PDFs Through Old MS Office and Adobe Vulnerabilities Asruex |
2019-08-22
⋅
Youtube (OALabs)
⋅
Remcos RAT Unpacked From VB6 With x64dbg Debugger Remcos |
2019-08-21
⋅
Threatgen
⋅
Taking a Closer Look at the LookBack Malware Campaign – Part 1 Lookback |
2019-08-19
⋅
⋅
EST Security
⋅
Konni APT organization emerges as an attack disguised as Russian document Konni |
2019-08-15
⋅
Malwarebytes
⋅
The Hidden Bee infection chain, part 1: the stegano pack Hidden Bee |
2019-08-12
⋅
Kaspersky Labs
⋅
Recent Cloud Atlas activity PowerShower Inception Framework |
2019-08-12
⋅
Kaspersky SAS
⋅
Chamois: Android's Most Impactful Botnet of 2018 Chamois |
2019-08-12
⋅
Kaspersky Labs
⋅
Recent Cloud Atlas activity PowerShower |
2019-08-08
⋅
BlackHat
⋅
The Enemy Within: Modern Supply Chain Attacks VPNFilter |
2019-08-07
⋅
FireEye
⋅
APT41: A Dual Espionage and Cyber Crime Operation APT41 |
2019-08-05
⋅
Threatpost
⋅
MegaCortex Ransomware Revamps for Mass Distribution MegaCortex |
2019-08-05
⋅
ESET Research
⋅
Sharpening the Machete Machete |
2019-08-01
⋅
Group-IB
⋅
Attacks by Silence Silence DDoS Kikothac Silence |
2019-08-01
⋅
Proofpoint
⋅
LookBack Malware Targets the United States Utilities Sector with Phishing Attacks Impersonating Engineering Licensing Boards GUP Proxy Tool Lookback TA410 |
2019-07-30
⋅
int 0xcc blog
⋅
Practical Threat Hunting and Incidence Response : A Case of A Pony Malware Infection Pony |
2019-07-29
⋅
ESET Research
⋅
Android ransomware is back FileCoder |
2019-07-28
⋅
Dissecting Malware
⋅
Third time's the charm? Analysing WannaCry samples WannaCryptor |