Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-04-17Cisco TalosDanny Adamitis, David Maynor, Matthew Olney, Paul Rascagnères, Warren Mercer
DNS Hijacking Abuses Trust In Core Internet Service
Sea Turtle
2019-04-17Cisco TalosDanny Adamitis, David Maynor, Matthew Olney, Paul Rascagnères, Warren Mercer
DNS Hijacking Abuses Trust In Core Internet Service
Sea Turtle
2019-04-01Vice MotherboardLorenzo Franceschi-Bicchierai
Prosecutors Launch Investigation Into Company That Put Malware on Google Play Store
Exodus
2019-03-29Vice MotherboardLorenzo Franceschi-Bicchierai, Riccardo Coluccini
Researchers Find Google Play Store Apps Were Actually Government Malware
Exodus
2019-03-29Vice MotherboardLorenzo Franceschi-Bicchierai, Riccardo Coluccini
Researchers Find Google Play Store Apps Were Actually Government Malware
Exodus
2019-03-18DCSODCSO
Enterprise Malware-as-a-Service: Lazarus Group and the Evolution of Ransomware
Hermes
2019-02-22Bleeping ComputerIonut Ilascu
Cr1ptT0r Ransomware Infects D-Link NAS Devices, Targets Embedded Systems
Cr1ptT0r
2019-01-01CrowdStrikeCrowdStrike
Viceroy Tiger
VICEROY TIGER
2018-12-20Trend MicroAugusto Remillano II, Mark Vicente
With Mirai Comes Miori: IoT Botnet Delivered via ThinkPHP Remote Code Execution Exploit
Mirai
2018-12-14Australian Cyber Security CentreASD
Investigationreport: Compromise of an Australian companyvia their Managed Service Provider
PlugX RedLeaves
2018-12-05Kaspersky LabsCostin Raiu, Vicente Diaz
APT review of the year
CardinalLizard ShaggyPanther
2018-12-04AvastAdolf Středa, Jan Neduchal
Hide ‘N Seek botnet continues infecting devices with default credentials, building a P2P network and more.
Hide and Seek
2018-12-04AvastAdolf Středa, Jan Neduchal
Hide ‘N Seek botnet continues infecting devices with default credentials, building a P2P network and more.
Hide and Seek
2018-11-29QuoScientQuoScient
Golden Chickens: Uncovering A Malware-as-a-Service (MaaS) Provider and Two New Threat Actors Using It
GC01 GC02
2018-11-01PeerlystSudhendu
How to Analyse FormBook - A New Malware-as-a-Service
Formbook
2018-10-16PeerlystSudhendu
How to understand FormBook - A New Malware-as-a-Service
Formbook
2018-09-21SonicWallSonicWall CaptureLabs Threats Research Team
VIGILANTE MALWARE REMOVES CRYPTOMINERS FROM THE INFECTED DEVICE
FBot
2018-07-25Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
OilRig Targets Technology Service Provider and Government Agency with QUADAGENT
OilRig
2018-07-25Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
OilRig Targets Technology Service Provider and Government Agency with QUADAGENT
OilRig
2018-07-13Trend MicroPeter Lee, Tony Yang
VPNFilter-affected Devices Still Riddled with 19 Vulnerabilities
VPNFilter