Click here to download all references as Bib-File.•
2019-09-19
⋅
Emissary Panda APT: Recent infrastructure and RAT analysis ZXShell |
2019-09-19
⋅
NSHC
⋅
Hagga of SectorH01 continues abusing Bitly, Blogger and Pastebin to deliver RevengeRAT and NanoCore Nanocore RAT Revenge RAT |
2019-09-18
⋅
Symantec
⋅
Tortoiseshell Group Targets IT Providers in Saudi Arabia in Probable Supply Chain Attacks SysKit Tortoiseshell |
2019-09-18
⋅
IronNet
⋅
Chirp of the PoisonFrog BONDUPDATER |
2019-09-17
⋅
Fortinet
⋅
Nemty Ransomware 1.0: A Threat in its Early Stage Nemty |
2019-09-17
⋅
Bleeping Computer
⋅
TFlower Ransomware - The Latest Attack Targeting Businesses TFlower |
2019-09-16
⋅
Malwarebytes
⋅
Emotet is back: botnet springs back to life with new spam campaign Emotet |
2019-09-14
⋅
Github (jeFF0Falltrades)
⋅
WSH RAT (A variant of H-Worm/Houdini) Houdini |
2019-09-13
⋅
MITRE
⋅
Machete El Machete |
2019-09-12
⋅
Avast
⋅
The tangle of WiryJMPer’s obfuscation NetWire RC |
2019-09-12
⋅
Zscaler
⋅
InnfiRAT: A new RAT aiming for your cryptocurrency and more win.innfirat |
2019-09-12
⋅
Github (cryptogramfan)
⋅
Ostap Deobfuscation script ostap |
2019-09-12
⋅
Virus Bulletin
⋅
A STUDY OF MACHETE CYBER ESPIONAGE OPERATIONS IN LATIN AMERICA Machete |
2019-09-11
⋅
Volexity
⋅
Vulnerable Private Networks: Corporate VPNs Exploited in the Wild |
2019-09-11
⋅
Talos Intelligence
⋅
Watchbog and the Importance of Patching kerberods |
2019-09-11
⋅
Bleeping Computer
⋅
Ryuk Related Malware Steals Confidential Military, Financial Files Ryuk Stealer |
2019-09-07
⋅
Dissecting Malware
⋅
Malicious RATatouille Remcos |
2019-09-06
⋅
FireEye
⋅
Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening and Containment |
2019-09-06
⋅
Proofpoint
⋅
PsiXBot Now Using Google DNS over HTTPS and Possible New Sexploitation Module PsiX |
2019-09-05
⋅
vmware
⋅
CB Threat Analysis Unit Technical Breakdown: GermanWiper Ransomware Ordinypt |