Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-07-26奇安信威胁情报中心 | 事件追踪
Analysis of the latest attack activities of APT-C-35
yty VICEROY TIGER
2018-07-26IntezerItai Tevet
Mitigating Emotet, The Most Common Banking Trojan
Emotet
2018-07-26FireEyeSwapnil Patil
Microsoft Office Vulnerabilities Used to Distribute FELIXROOT Backdoor in Recent Campaign
Felixroot
2018-07-25SymantecCritical Attack Discovery and Intelligence Team, Network Protection Security Labs
Leafminer: New Espionage Campaigns Targeting Middle Eastern Regions
Imecab MimiKatz Sorgu RASPITE
2018-07-25ProofpointProofpoint Staff
Parasite HTTP RAT cooks up a stew of stealthy tricks
parasite_http
2018-07-25SymantecNetwork Protection Security Labs, Security Response Attack Investigation Team
Leafminer: New Espionage Campaigns Targeting Middle Eastern Regions
Imecab Sorgu RASPITE
2018-07-24Check PointBen Herzog, Ofer Caspi
Emotet: The Tricky Trojan that ‘Git Clones’
Emotet
2018-07-23CSSCyber Security Strategists
A long-term espionage campaign in Syria
APT-C-27
2018-07-23Bleeping ComputerCatalin Cimpanu
Source Code for Exobot Android Banking Trojan Leaked Online
ExoBot
2018-07-23360 Threat IntelligenceQi Anxin Threat Intelligence Center
Golden Rat Organization-targeted attack in Syria
NjRAT APT-C-27
2018-07-23MalFindLasq
Deobfuscating Emotet’s powershell payload
Emotet
2018-07-20ReutersJack Kim
Cyberattack on Singapore health database steals details of 1.5 million, including PM
Whitefly
2018-07-20NCCICCommunications Integration Center, National Cybersecurity
Alert (TA18-201A) Emotet Malware
Emotet
2018-07-19Bleeping ComputerCatalin Cimpanu
Router Crapfest: Malware Author Builds 18,000-Strong Botnet in a Day
Owari
2018-07-19ProofpointProofpoint Staff
TA505 Abusing SettingContent-ms within PDF files to Distribute FlawedAmmyy RAT
FlawedAmmyy
2018-07-18SymantecSecurity Response Attack Investigation Team
The Evolution of Emotet: From Banking Trojan to Threat Distributor
Emotet
2018-07-17IntrusiontruthIntrusiontruth
Who was behind this unprecedented Cyber attack on Western infrastructure?
2018-07-17Trend MicroJoey Chen
Blackgear Cyberespionage Campaign Resurfaces, Abuses Social Media for C&C Communication
Blackgear
2018-07-17ESET ResearchKaspars Osis
A deep dive down the Vermin RAThole
Quasar RAT Sobaken Vermin
2018-07-13Palo Alto Networks Unit 42Brittany Ash, Mike Harbison
Upatre Continued to Evolve with new Anti-Analysis Techniques
Upatre