Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-04-17AvastOndrej Vlcek
Recent findings from CCleaner APT investigation reveal that attackers entered the Piriform network via TeamViewer
CCleaner Backdoor
2018-04-16Random REsysopfb
TrickBot & UACME
TrickBot
2018-04-16Kaspersky LabsSuguru Ishimaru
Roaming Mantis uses DNS hijacking to infect Android smartphones
Roaming Mantis
2018-04-15Blaze's Security BlogBartBlaze
This is Spartacus: new ransomware on the block
Spartacus
2018-04-13NewSky SecurityNewSky Security
Understanding the IoT Hacker — A Conversation With Owari/Sora IoT Botnet Author
Owari
2018-04-13BitdefenderBogdan Botezatu, Eduard Budaca
RadRAT: An all-in-one toolkit for complex espionage ops
RadRAT
2018-04-05PhishLabsCrane Hassold
Silent Librarian University Attacks Continue Unabated in Days Following Indictment
Silent Librarian
2018-04-04WiredLily Hay Newman
The Billion-Dollar Hacking Group Behind a String of Big Breaches
FIN7
2018-04-04Trend MicroJaromír Hořejší
New MacOS Backdoor Linked to OceanLotus Found
OceanLotus
2018-04-04NCSC UKNCSC UK
Hostile state actors compromising UK organisations with focus on engineering and industrial control companies
Goodor
2018-04-01SophosDorka Palotay, Peter Mackenzie
SamSam Ransomware Chooses Its Targets Carefully
SamSam
2018-03-30Trend MicroDavid Sancho, Massimiliano Michenz, Numaan Huq
Cashing in on ATM Malware: A Comprehensive Look at Various Attack Types
Project Alice ATMitch Ploutus ATM Ripper ATM Skimer SUCEFUL Tyupkin
2018-03-30360 Threat IntelligenceQi Anxin Threat Intelligence Center
Analysis of the latest cyber attack activity of the APT organization against sensitive institutions in China
Quasar RAT
2018-03-30Kahu SecurityKahu Security
Reflow JavaScript Backdoor
AIRBREAK
2018-03-23FireEyeSudeep Singh, Yijie Sui
Sanny malware delivery method updated in recently observed attacks.
Sanny
2018-03-22ESET ResearchFrédéric Vachon
Glupteba is no longer part of Windigo
Glupteba
2018-03-19hasherezade
Unpacking Ursnif
ISFB
2018-03-14SymantecNetwork Protection Security Labs, Security Response Attack Investigation Team
Inception Framework: Alive and Well, and Hiding Behind Proxies
Inception Framework
2018-03-13FireEyeBen Read, Dileep Kumar Jallepalli, Sudeep Singh, Yogesh Londhe
Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign
POWERSTATS MuddyWater
2018-03-12Trend MicroJaromír Hořejší
Campaign Possibly Connected to “MuddyWater” Surfaces in the Middle East and Central Asia
POWERSTATS MuddyWater