Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-10-07Team CymruBrian Eckman
GhostDNSbusters (Part 2)
2020-10-07CrowdStrikeThe Falcon Complete Team
Duck Hunting with Falcon Complete: Analyzing a Fowl Banking Trojan, Part 2
QakBot Zloader
2020-10-06Trend MicroFyodor Yarochkin, Robert McArdle, Vladimir Kropotov
The Hacker Infrastructure and Underground Hosting: Cybercrime Modi Operandi and OpSec
2020-10-06FR3D.HKFR3D.HK
IXWare - Kids will be skids
IXWare
2020-10-06CrowdStrikeThe Crowdstrike Intel Team
Double Trouble: Ransomware with Data Leak Extortion, Part 2
Maze MedusaLocker REvil VIKING SPIDER
2020-10-06SentinelOneJim Walter
The FONIX RaaS | New Low-Key Threat with Unnecessary Complexities
FONIX
2020-10-06BlackberryBlackberry Research
BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps
Bahamut Bahamut
2020-10-06TelekomThomas Barabosch
Eager Beaver: A Short Overview of the Restless Threat Actor TA505
Clop Get2 SDBbot TA505
2020-10-06MalwarebytesHossein Jazi, Jérôme Segura
Release the Kraken: Fileless APT attack abuses Windows Error Reporting service
2020-10-06360 netlabJiaYu
HEH, a new IoT P2P Botnet going after weak telnet services
2020-10-06Trend MicroCedric Pernet
French companies Under Attack from Clever BEC Scam
2020-10-05KasperskyIgor Kuznetsov, Mark Lechtik, Yury Parshin
MosaicRegressor: Lurking in the Shadows of UEFI
2020-10-05Zawadi DoneZawadi Done
DarkSide ransomware analysis
DarkSide
2020-10-05paloalto Networks Unit 42Nathaniel Quist
Black-T: New Cryptojacking Variant from TeamTnT
2020-10-05Kaspersky LabsIgor Kuznetsov, Mark Lechtik
MosaicRegressor: Lurking in the Shadows of UEFI (Technical Details)
2020-10-05Kaspersky LabsIgor Kuznetsov, Mark Lechtik
MosaicRegressor: Lurking in the Shadows of UEFI
MosaicRegressor
2020-10-05JuniperPaul Kimayong
New pastebin-like service used in multiple malware campaigns
Agent Tesla LimeRAT RedLine Stealer
2020-10-03VB LocalhostRintaro Koike, Shogo Hayashi, Takai Hajime
Unveiling the CryptoMimic
CageyChameleon SnatchCrypto
2020-10-03Youtube (L!NK)LinkCabin
Malware Analysis: Stealer - Mutex Check, Stackstrings, IDA (Part 1)
Raccoon
2020-10-03WikipediaWikpedia
Wikipedia Page: Maksim Yakubets
Dridex Feodo Evil Corp