Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-11-27BlacklakeBrian Krebs
WHO WAS THE NSA CONTRACTOR ARRESTED FOR LEAKING THE ‘SHADOW BROKERS’ HACKING TOOLS?
The Shadow Brokers
2017-11-24Bleeping ComputerCatalin Cimpanu
Mirai Activity Picks up Once More After Publication of PoC Exploit Code
Mirai
2017-11-22FlashpointVitali Kremez
Trickbot Gang Evolves, Incorporates Account Checking Into Hybrid Attack Model
TrickBot
2017-11-21Vitali Kremez
Let's Learn: Trickbot Socks5 Backconnect Module In Detail
TrickBot
2017-11-20Trend MicroFyodor Yarochkin, Lenart Bermejo, Ronnie Giagone
Cobalt Strikes Again: Spam Runs Use Macros and CVE-2017-8759 Exploit Against Russian Banks
More_eggs Cobalt
2017-11-19Arab NewsELISE KNUTSEN
Iranian agents blackmailed BBC reporter with ‘naked photo’ threats
Charming Kitten
2017-11-16Github (mdsecactivebreach)Vincent Yiu
CACTUSTORCH: Payload Generation for Adversary Simulations
CACTUSTORCH
2017-11-15Trend MicroRubio Wu
New EMOTET Hijacks a Windows API, Evades Sandbox and Analysis
Emotet
2017-11-14Palo Alto Networks Unit 42Tom Lancaster
Muddying the Water: Targeted Attacks in the Middle East
POWERSTATS MuddyWater
2017-11-12Vitali Kremez BlogVitali Kremez
Let's Learn: Dissecting Golroted Trojan's Process Hollowing Technique & UAC Bypass in HKCU\Environment
Golroted
2017-11-09WiredAndy Greenberg
He Perfected a Password-Hacking Tool—Then the Russians Came Calling
MimiKatz
2017-11-08ReaqtaReaqta
A short journey into DarkVNC attack chain
DarkVNC
2017-11-08FreebufSecurity Leopard
Analysis of an active USB flash drive virus
MyloBot
2017-11-07Trend MicroJoey Chen, MingYen Hsieh
REDBALDKNIGHT/BRONZE BUTLER’s Daserf Backdoor Now Using Steganography
Tick
2017-11-07Trend MicroTrendmicro
REDBALDKNIGHT/BRONZE BUTLER’s Daserf Backdoor Now Using Steganography
Daserf Datper xxmm
2017-11-02PWC UKBart Parys
The KeyBoys are back in town
KeyBoy
2017-11-02RiskIQYonathan Klijnsma
New Insights into Energetic Bear’s Watering Hole Cyber Attacks on Turkish Critical Infrastructure
ENERGETIC BEAR
2017-11-02Palo Alto Networks Unit 42Jacob Soo, Josh Grunzweig
Recent InPage Exploits Lead to Multiple Malware Families
Confucius
2017-11-02TalosEarl Carter, Edmund Brumaghin, Emmanuel Tacheau
Poisoning the Well: Banking Trojan Targets Google Search Results
PandaBanker
2017-11-02Palo Alto Networks Unit 42Jacob Soo, Josh Grunzweig
Recent InPage Exploits Lead to Multiple Malware Families
BioData