Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-09-19MeltX0R
Emissary Panda APT: Recent infrastructure and RAT analysis
ZXShell
2019-09-19NSHCThreatRecon Team
Hagga of SectorH01 continues abusing Bitly, Blogger and Pastebin to deliver RevengeRAT and NanoCore
Nanocore RAT Revenge RAT
2019-09-18SymantecSecurity Response Attack Investigation Team
Tortoiseshell Group Targets IT Providers in Saudi Arabia in Probable Supply Chain Attacks
SysKit Tortoiseshell
2019-09-18IronNetJonathan Lepore
Chirp of the PoisonFrog
BONDUPDATER
2019-09-17FortinetJoie Salvio
Nemty Ransomware 1.0: A Threat in its Early Stage
Nemty
2019-09-17Bleeping ComputerLawrence Abrams
TFlower Ransomware - The Latest Attack Targeting Businesses
TFlower
2019-09-16MalwarebytesThreat Intelligence Team
Emotet is back: botnet springs back to life with new spam campaign
Emotet
2019-09-14Github (jeFF0Falltrades)Jeff Archer
WSH RAT (A variant of H-Worm/Houdini)
Houdini
2019-09-13MITREMITRE ATT&CK
Machete
El Machete
2019-09-12AvastAdolf Středa, Luigino Camastra
The tangle of WiryJMPer’s obfuscation
NetWire RC
2019-09-12ZscalerRohit Chaturvedi, Sahil Antil
InnfiRAT: A new RAT aiming for your cryptocurrency and more
win.innfirat
2019-09-12Github (cryptogramfan)Alex Holland
Ostap Deobfuscation script
ostap
2019-09-12Virus BulletinKamila Babayeva, Maria Rigaki, Sebastian García, Veronica Valeros
A STUDY OF MACHETE CYBER ESPIONAGE OPERATIONS IN LATIN AMERICA
Machete
2019-09-11VolexitySean Koessel, Steven Adair
Vulnerable Private Networks: Corporate VPNs Exploited in the Wild
2019-09-11Talos IntelligenceLuke DuCharme, Paul Lee
Watchbog and the Importance of Patching
kerberods
2019-09-11Bleeping ComputerLawrence Abrams
Ryuk Related Malware Steals Confidential Military, Financial Files
Ryuk Stealer
2019-09-07Dissecting MalwareMarius Genheimer
Malicious RATatouille
Remcos
2019-09-06FireEyeFireEye, Mandiant
Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening and Containment
2019-09-06ProofpointProofpoint Threat Insight Team
PsiXBot Now Using Google DNS over HTTPS and Possible New Sexploitation Module
PsiX
2019-09-05vmwareSwee Lai Lee
CB Threat Analysis Unit Technical Breakdown: GermanWiper Ransomware
Ordinypt