Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-05-01ESET ResearchMatthieu Faou
TURLA LIGHTNEURON: One email away from remote code execution
LightNeuron
2019-05-01ClearSkyClearSky Research Team
Iranian Nation-State APT Groups 'Black Box' Leak
[Unnamed group]
2019-04-30Council on Foreign RelationsCyber Operations Tracker
APT 40
APT40
2019-04-30Cisco TalosColin Grady, Jaeson Schultz, Matt Valites, Pierre Cadieux
Sodinokibi ransomware exploits WebLogic Server vulnerability
REvil
2019-04-30ESET ResearchESET Research
Buhtrap backdoor and Buran ransomware distributed via major advertising platform
Buhtrap ClipBanker RTM
2019-04-30ClearSkyClearSky Cyber Security
Raw Threat Intelligence 2019-04-30: Oilrig data dump link analysis
SpyNote OopsIE
2019-04-29BluelivBlueliv Labs Team
Where is Emotet? Latest geolocation data
Emotet
2019-04-26Bleeping ComputerLawrence Abrams
A Closer Look at the RobbinHood Ransomware
RobinHood
2019-04-25DATANETKim Seon-ae
Chinese-based hackers attack domestic energy institutions
CALMTHORN Ghost RAT
2019-04-25CybereasonCybereason Nocturnus
Threat Actor TA505 Targets Financial Enterprises Using LOLBins and a New Backdoor Malware
ServHelper TA505
2019-04-25AppGateEdgar Felipe Duarte Porras
Meet Lucifer: A New International Trojan
Astaroth
2019-04-24Check Point ResearchItay Cohen
Deobfuscating APT32 Flow Graphs with Cutter and Radare2
Salgorea
2019-04-24WeixinTencent
"Sea Lotus" APT organization's attack techniques against China in the first quarter of 2019 revealed
Cobalt Strike SOUNDBITE
2019-04-24SymantecSymantec Response Attack Investigation Team
Beapy: Cryptojacking Worm Hits Enterprises in China
Beapy
2019-04-24SpecterOpsRichie Cyrus
Introducing Venator: A macOS tool for proactive detection
AppleJeus WindTail
2019-04-23Kaspersky LabsAMR, GReAT
Operation ShadowHammer: a high-profile supply chain attack
shadowhammer ShadowPad
2019-04-22KrebsOnSecurityBrian Krebs
Who’s Behind the RevCode WebMonitor RAT?
WebMonitor RAT
2019-04-22int 0xcc blogRaashid Bhat
Dissecting Emotet’s network communication protocol
Emotet
2019-04-19CylanceCylance Threat Research Team
OceanLotus Steganography
2019-04-19Mediumx0rz
Hacking (Back) and Influence Operations
BONDUPDATER