Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-01-18LookoutAndrew Blaich, Apurva Kumar, Cooper Quintin, Eva Galperin, Jeremy Richards, Michael Flossman
Dark Caracal: Cyber-espionage at a Global Scal
CrossRAT Bandook Dark Caracal
2018-01-17360 netlabRootKiter
Art of Steal: Satori Variant is Robbing ETH BitCoin by Replacing Wallet Address
Satori
2018-01-16Kaspersky LabsAlexey Firsh, Nikita Buchka
Skygofree: Following in the footsteps of HackingTeam
Skygofree
2018-01-16RiskIQYonathan Klijnsma
First Activities of Cobalt Group in 2018: Spear Phishing Russian Banks
Cobalt
2018-01-15AcronisAcronis Security
GlobeImposter ransomware: A holiday gift from the Necurs botnet
GlobeImposter
2018-01-15VirITGianfranco Tonello
Bootkits are not dead. Pitou is back!
Pitou
2018-01-13The Washington PostEllen Nakashima
Russian military was behind ‘NotPetya’ cyberattack in Ukraine, CIA concludes
EternalPetya
2018-01-12MediumJacob Pimental
Sonja Analysis
Snojan
2018-01-12StormshieldRémi Jullian
Analyzing an Agent Tesla campaign: from a word document to the attacker credentials
Agent Tesla
2018-01-11Youtube (OALabs)Sergei Frankoff
Unpacking Pykspa Malware With Python and IDA Pro - Subscriber Request Part 1
Pykspa
2018-01-10WiredLouise Matsakis
Hack Brief: Russian Hackers Release Apparent IOC Emails in Wake of Olympic Ban
APT28
2018-01-10FreebufTencent Computer Manager
Analysis of BlackTech's latest APT attack
PLEAD
2018-01-10U.S. Department of Justice
Phillip Durachinsky Indictment
FruitFly
2018-01-09Jacquais
BestKorea
BestKorea
2018-01-06CERT.PLPaweł Srokosz
Ostap malware analysis (Backswap dropper)
ostap
2018-01-04Carnegie Endowment for International PeaceCollin Anderson, Karim Sadjapour
Iran’s Cyber Ecosystem: Who Are the Threat Actors?
Magic Kitten
2018-01-01Council on Foreign RelationsCyber Operations Tracker
APT 35
APT35
2018-01-01RiskIQBrandon Dixon
Alphathreat Soup Burning Actors with Data
2018-01-01AccentureAlireza Salimi, Benjamin G. McCarthy, Joshua Ray
Monero and WannaMine: The cyber-criminal cryptocurrency and miner malware of choice
WannaMine
2018-01-01AccentureBart Parys, Joshua Ray
Dragonfish delivers New Form of Elise Malware targeting ASEAN Defence Ministers' Meeting and Associates
Elise LOTUS PANDA