Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-09-26Objective-SeePatrick Wardle
FinFisher Filleted: a triage of the FinSpy (macOS) malware
FinFisher
2020-09-25StateScoopBenjamin Freed
Baltimore ransomware attack was early attempt at data extortion, new report shows
Maze RobinHood OUTLAW SPIDER
2020-09-25SUCURIKrasimir Konov
Magento Credit Card Stealing Malware: gstaticapi
2020-09-25360 Total Securitykate
APT-C-43 steals Venezuelan military secrets to provide intelligence support for the reactionaries - HpReact campaign
PyArk El Machete
2020-09-25CrowdStrikeThe Crowdstrike Intel Team
Double Trouble: Ransomware with Data Leak Extortion, Part 1
DoppelPaymer FriedEx LockBit Maze MedusaLocker RagnarLocker REvil RobinHood SamSam WastedLocker MIMIC SPIDER PIZZO SPIDER TA2101 VIKING SPIDER
2020-09-24MicrosoftBen Koehl, Joe Hannon
Microsoft Security—detecting empires in the cloud
2020-09-24CrowdStrikeCrowdStrike Intelligence Team
Double Trouble: Ransomware with Data Leak Extortion, Part 1
DoppelPaymer Gandcrab LockBit Maze MedusaLocker RagnarLocker SamSam OUTLAW SPIDER OVERLORD SPIDER
2020-09-24SophosLabsSophosLabs
Email-delivered MoDi RAT attack pastes PowerShell commands
MoDi RAT
2020-09-24BitdefenderAlexandra Bocereg, Bogdan Botezatu, Ioan-Septimiu Dinulica, Oana Asoltanei
Apps on Google Play Tainted with Cerberus Banker Malware
Cerberus
2020-09-24Kaspersky LabsKaspersky Lab ICS CERT
Threat landscape for industrial automation systems - H1 2020
Poet RAT Mailto Milum RagnarLocker REvil Ryuk Snake
2020-09-24Bleeping ComputerLawrence Abrams
Mount Locker ransomware joins the multi-million dollar ransom game
Mount Locker
2020-09-24FacebookNathaniel Gleicher
Removing Coordinated Inauthentic Behavior
2020-09-24GraphikaBen Nimmo, C. Shawn Eib, Camille François, Joseph Carter, Lea Ronzaud
GRU and the Minions: Further Exposures of Russian Military Assets Across Platforms, 2013-2020
2020-09-24SophosLabs UncutAndrew Brandt, Andrew O'Donnell, Fraser Howard
Email-delivered MoDi RAT attack pastes PowerShell commands
DBatLoader
2020-09-24Click All the Things! BlogJamie Arndt
zLoader XLM Update: Macro code and behavior change
Zloader
2020-09-24CAROGiampaolo Dedola, Mark Lechtik
Cycldek aka Goblin Panda: Chronicles of the Goblin
NewCore RAT USBCulprit
2020-09-24MicrosoftBen Koehl, Joe Hannon, Microsoft Identity Security Team
Microsoft Security—detecting empires in the cloud
CACTUSTORCH LazyCat APT40
2020-09-23paloalto Netoworks: Unit42Brad Duncan
Case Study: Emotet Thread Hijacking, an Email Attack Technique
Emotet
2020-09-23SeqriteKalpesh Mantri
Operation SideCopy!
SideCopy
2020-09-23Kaspersky LabsNoushin Shabab
Looking for sophisticated malware in IoT devices