Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-09-23Palo Alto Networks Unit 42Brittany Barbehenn, Robert Falcone
xHunt Campaign: Attacks on Kuwait Shipping and Transportation Organizations
Hisoka
2019-09-22ProofpointMichael Raggi, Proofpoint Threat Insight Team
LookBack Forges Ahead: Continued Targeting of the United States’ Utilities Sector Reveals Additional Adversary TTPs
Lookback TA410
2019-09-20Trend MicroLuis Magisa
Mac Malware that Spoofs Trading App Steals User Information, Uploads it to Website
Gmera
2019-09-20SNORT Mailing ListsYM
Multiple signatures 032
Laturo Stealer
2019-09-19MeltX0R
Emissary Panda APT: Recent infrastructure and RAT analysis
ZXShell
2019-09-19NSHCThreatRecon Team
Hagga of SectorH01 continues abusing Bitly, Blogger and Pastebin to deliver RevengeRAT and NanoCore
Nanocore RAT Revenge RAT
2019-09-18SymantecSecurity Response Attack Investigation Team
Tortoiseshell Group Targets IT Providers in Saudi Arabia in Probable Supply Chain Attacks
SysKit Tortoiseshell
2019-09-18IronNetJonathan Lepore
Chirp of the PoisonFrog
BONDUPDATER
2019-09-17FortinetJoie Salvio
Nemty Ransomware 1.0: A Threat in its Early Stage
Nemty
2019-09-17Bleeping ComputerLawrence Abrams
TFlower Ransomware - The Latest Attack Targeting Businesses
TFlower
2019-09-16MalwarebytesThreat Intelligence Team
Emotet is back: botnet springs back to life with new spam campaign
Emotet
2019-09-14Github (jeFF0Falltrades)Jeff Archer
WSH RAT (A variant of H-Worm/Houdini)
Houdini
2019-09-13MITREMITRE ATT&CK
Machete
El Machete
2019-09-12AvastAdolf Středa, Luigino Camastra
The tangle of WiryJMPer’s obfuscation
NetWire RC
2019-09-12ZscalerRohit Chaturvedi, Sahil Antil
InnfiRAT: A new RAT aiming for your cryptocurrency and more
win.innfirat
2019-09-12Github (cryptogramfan)Alex Holland
Ostap Deobfuscation script
ostap
2019-09-12Virus BulletinKamila Babayeva, Maria Rigaki, Sebastian García, Veronica Valeros
A STUDY OF MACHETE CYBER ESPIONAGE OPERATIONS IN LATIN AMERICA
Machete
2019-09-11VolexitySean Koessel, Steven Adair
Vulnerable Private Networks: Corporate VPNs Exploited in the Wild
2019-09-11Talos IntelligenceLuke DuCharme, Paul Lee
Watchbog and the Importance of Patching
kerberods
2019-09-11Bleeping ComputerLawrence Abrams
Ryuk Related Malware Steals Confidential Military, Financial Files
Ryuk Stealer