Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-06-14CofenseAaron Riley, Nick Guarino
Houdini Worm Transformed in New Phishing Attack
Houdini
2019-06-14CertegoMatteo Lodi
Malware Tales: Sodinokibi
REvil
2019-06-13ae CERTae CERT
Advanced Notification of Cyber Threats against Family of Malware Giving Remote Access to Computers
HyperBro HyperSSL
2019-06-13AkamaiLarry Cashdollar
Latest ECHOBOT: 26 Infection Vectors
Echobot
2019-06-12GdataKarsten Hahn
Ransomware identification for the judicious analyst
Cerber Cryptowall CryptoFortress Locky PadCrypt Spora VirLock
2019-06-12Palo Alto Networks Unit 42Ruchna Nigam
Hide ‘N Seek Botnet Updates Arsenal with Exploits Against Nexus Repository Manager & ThinkPHP
Hide and Seek
2019-06-12CyberbitHod Gavriel
Formbook Research Hints Large Data Theft Attack Brewing
Formbook
2019-06-11AnomaliAnomali Threat Research
The InterPlanetary Storm: New Malware in Wild Using InterPlanetary File System’s (IPFS) p2p network
IPStorm
2019-06-10ESTsecurityAlyac
[Special Report] APT Campaign 'Konni' & 'Kimsuky' Organizations Found in Common
Kimsuky
2019-06-10Trend MicroDaniel Lunghi, Jaromír Hořejší
New MuddyWater Activities Uncovered: Threat Actors Used Multi-Stage Backdoors, New Post-Exploitation Tools, Android Malware, and More
Mudwater SHARPSTATS
2019-06-10CylanceCylance Threat Research Team
Threat Spotlight: MenuPass/QuasarRAT Backdoor
DILLJUICE
2019-06-10Trend MicroDaniel Lunghi, Jaromír Hořejší
MuddyWater Resurfaces, Uses Multi-Stage Backdoor POWERSTATS V3 and New Post-Exploitation Tools
POWERSTATS
2019-06-08Github (DannyTheSloth)DannyTheSloth
Vanilla RAT
vanillarat
2019-06-06Ars TechnicaDan Goodin
Google confirms that advanced backdoor came preinstalled on Android devices
Triada
2019-06-05ThreatStopOfir Ashman
Upgraded JasperLoader Infecting Machines with New Targets & Functional Improvements: What You Need to Know
JasperLoader
2019-06-05FireEyeSwapnil Patil
Government Sector in Central Asia Targeted With New HAWKBALL Backdoor Delivered via Microsoft Office Vulnerabilities
HAWKBALL
2019-06-04CERNCERN Computer Security
Advisory: Windigo attacks
Ebury
2019-06-04CylanceCylance Threat Research Team
Threat Spotlight: Analyzing AZORult Infostealer Malware
Azorult
2019-06-04BitdefenderBitdefender
An APT Blueprint: Gaining New Visibility into Financial Threats
More_eggs Cobalt Strike
2019-06-04KrabsOnSecurityMr. Krabs
Taking a look at Baldr stealer
Baldr