Click here to download all references as Bib-File.•
2018-01-18
⋅
Lookout
⋅
Dark Caracal: Cyber-espionage at a Global Scal CrossRAT Bandook Dark Caracal |
2018-01-17
⋅
360 netlab
⋅
Art of Steal: Satori Variant is Robbing ETH BitCoin by Replacing Wallet Address Satori |
2018-01-16
⋅
Kaspersky Labs
⋅
Skygofree: Following in the footsteps of HackingTeam Skygofree |
2018-01-16
⋅
RiskIQ
⋅
First Activities of Cobalt Group in 2018: Spear Phishing Russian Banks Cobalt |
2018-01-15
⋅
Acronis
⋅
GlobeImposter ransomware: A holiday gift from the Necurs botnet GlobeImposter |
2018-01-15
⋅
VirIT
⋅
Bootkits are not dead. Pitou is back! Pitou |
2018-01-13
⋅
The Washington Post
⋅
Russian military was behind ‘NotPetya’ cyberattack in Ukraine, CIA concludes EternalPetya |
2018-01-12
⋅
Medium
⋅
Sonja Analysis Snojan |
2018-01-12
⋅
Stormshield
⋅
Analyzing an Agent Tesla campaign: from a word document to the attacker credentials Agent Tesla |
2018-01-11
⋅
Youtube (OALabs)
⋅
Unpacking Pykspa Malware With Python and IDA Pro - Subscriber Request Part 1 Pykspa |
2018-01-10
⋅
Wired
⋅
Hack Brief: Russian Hackers Release Apparent IOC Emails in Wake of Olympic Ban APT28 |
2018-01-10
⋅
Freebuf
⋅
Analysis of BlackTech's latest APT attack PLEAD |
2018-01-10
⋅
Phillip Durachinsky Indictment FruitFly |
2018-01-09
⋅
BestKorea BestKorea |
2018-01-06
⋅
CERT.PL
⋅
Ostap malware analysis (Backswap dropper) ostap |
2018-01-04
⋅
Carnegie Endowment for International Peace
⋅
Iran’s Cyber Ecosystem: Who Are the Threat Actors? Magic Kitten |
2018-01-01
⋅
Council on Foreign Relations
⋅
APT 35 APT35 |
2018-01-01
⋅
RiskIQ
⋅
Alphathreat Soup Burning Actors with Data |
2018-01-01
⋅
Accenture
⋅
Monero and WannaMine: The cyber-criminal cryptocurrency and miner malware of choice WannaMine |
2018-01-01
⋅
Accenture
⋅
Dragonfish delivers New Form of Elise Malware targeting ASEAN Defence Ministers' Meeting and Associates Elise LOTUS PANDA |