Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-04-30Cisco TalosColin Grady, Jaeson Schultz, Matt Valites, Pierre Cadieux
Sodinokibi ransomware exploits WebLogic Server vulnerability
REvil
2019-04-30ESET ResearchESET Research
Buhtrap backdoor and Buran ransomware distributed via major advertising platform
Buhtrap ClipBanker RTM
2019-04-30ClearSkyClearSky Cyber Security
Raw Threat Intelligence 2019-04-30: Oilrig data dump link analysis
SpyNote OopsIE
2019-04-29BluelivBlueliv Labs Team
Where is Emotet? Latest geolocation data
Emotet
2019-04-26Bleeping ComputerLawrence Abrams
A Closer Look at the RobbinHood Ransomware
RobinHood
2019-04-25DATANETKim Seon-ae
Chinese-based hackers attack domestic energy institutions
CALMTHORN Ghost RAT
2019-04-25CybereasonCybereason Nocturnus
Threat Actor TA505 Targets Financial Enterprises Using LOLBins and a New Backdoor Malware
ServHelper TA505
2019-04-25AppGateEdgar Felipe Duarte Porras
Meet Lucifer: A New International Trojan
Astaroth
2019-04-24Check Point ResearchItay Cohen
Deobfuscating APT32 Flow Graphs with Cutter and Radare2
Salgorea
2019-04-24WeixinTencent
"Sea Lotus" APT organization's attack techniques against China in the first quarter of 2019 revealed
Cobalt Strike SOUNDBITE
2019-04-24SymantecSymantec Response Attack Investigation Team
Beapy: Cryptojacking Worm Hits Enterprises in China
Beapy
2019-04-24SpecterOpsRichie Cyrus
Introducing Venator: A macOS tool for proactive detection
AppleJeus WindTail
2019-04-23Kaspersky LabsAMR, GReAT
Operation ShadowHammer: a high-profile supply chain attack
shadowhammer ShadowPad
2019-04-22KrebsOnSecurityBrian Krebs
Who’s Behind the RevCode WebMonitor RAT?
WebMonitor RAT
2019-04-22int 0xcc blogRaashid Bhat
Dissecting Emotet’s network communication protocol
Emotet
2019-04-19CylanceCylance Threat Research Team
OceanLotus Steganography
2019-04-19Mediumx0rz
Hacking (Back) and Influence Operations
BONDUPDATER
2019-04-19ZDNetCatalin Cimpanu
Security researcher MalwareTech pleads guilty
Kronos
2019-04-18FortinetEvgeny Ananin, Yueh-Ting Chen
Predator the Thief: New Routes of Delivery
Predator The Thief
2019-04-17Cisco TalosDanny Adamitis, David Maynor, Matthew Olney, Paul Rascagnères, Warren Mercer
DNS Hijacking Abuses Trust In Core Internet Service
Sea Turtle