Click here to download all references as Bib-File.•
| 2019-08-27
⋅
Cisco Talos
⋅
China Chopper still active 9 years later CHINACHOPPER |
| 2019-08-23
⋅
The New York Times
⋅
Ransomware Attacks Are Testing Resolve of Cities Across America REvil |
| 2019-08-22
⋅
Trend Micro
⋅
Asruex Backdoor Variant Infects Word Documents and PDFs Through Old MS Office and Adobe Vulnerabilities Asruex |
| 2019-08-22
⋅
Youtube (OALabs)
⋅
Remcos RAT Unpacked From VB6 With x64dbg Debugger Remcos |
| 2019-08-21
⋅
Threatgen
⋅
Taking a Closer Look at the LookBack Malware Campaign – Part 1 Lookback |
| 2019-08-19
⋅
⋅
EST Security
⋅
Konni APT organization emerges as an attack disguised as Russian document Konni |
| 2019-08-15
⋅
Malwarebytes
⋅
The Hidden Bee infection chain, part 1: the stegano pack Hidden Bee |
| 2019-08-12
⋅
Kaspersky Labs
⋅
Recent Cloud Atlas activity PowerShower Inception Framework |
| 2019-08-12
⋅
Kaspersky SAS
⋅
Chamois: Android's Most Impactful Botnet of 2018 Chamois |
| 2019-08-12
⋅
Kaspersky Labs
⋅
Recent Cloud Atlas activity PowerShower |
| 2019-08-08
⋅
BlackHat
⋅
The Enemy Within: Modern Supply Chain Attacks VPNFilter |
| 2019-08-07
⋅
FireEye
⋅
APT41: A Dual Espionage and Cyber Crime Operation APT41 |
| 2019-08-05
⋅
Threatpost
⋅
MegaCortex Ransomware Revamps for Mass Distribution MegaCortex |
| 2019-08-05
⋅
ESET Research
⋅
Sharpening the Machete Machete |
| 2019-08-01
⋅
Group-IB
⋅
Attacks by Silence Silence DDoS Kikothac Silence |
| 2019-08-01
⋅
Proofpoint
⋅
LookBack Malware Targets the United States Utilities Sector with Phishing Attacks Impersonating Engineering Licensing Boards GUP Proxy Tool Lookback TA410 |
| 2019-07-30
⋅
int 0xcc blog
⋅
Practical Threat Hunting and Incidence Response : A Case of A Pony Malware Infection Pony |
| 2019-07-29
⋅
ESET Research
⋅
Android ransomware is back FileCoder |
| 2019-07-28
⋅
Dissecting Malware
⋅
Third time's the charm? Analysing WannaCry samples WannaCryptor |
| 2019-07-25
⋅
Intrusiontruth
⋅
Encore! APT17 hacked Chinese targets and offered the data for sale |