Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-03-18Pepper Potts
Analysis of BlackMoon (Banking Trojan)'s Evolution, And The Possibility of a Latest Version Under Development
KrBanker
2019-03-17Global ATM Malware WallCybercrime Tracker
Global ATM Malware Wall
Ligsterac Skimer
2019-03-17Persianov on SecuritySveatoslav Persianov
Emotet malware analysis. Part 1
Emotet
2019-03-17ZDNetCatalin Cimpanu
Round 4: Hacker returns and puts 26Mil user records for sale on the Dark Web
Gnosticplayers
2019-03-15ZscalerRajdeepsinh Dodia, Uday Pratap Singh
Immortal information stealer
Immortal Stealer
2019-03-15AnomaliThreat Research Team
Rocke Evolves Its Arsenal With a New Malware Family Written in Golang
kerberods
2019-03-15CofenseThreat Intelligence
Flash Bulletin: Emotet Epoch 1 Changes its C2 Communication
Emotet
2019-03-14ProofpointProofpoint
Daily Ruleset Update Summary 2019/03/14
CageyChameleon
2019-03-14TrustwaveSimon Kenin
Attacker Tracking Users Seeking Pakistani Passport
scanbox
2019-03-13CylanceTatsuya Hasegawa
BlackBerry Cylance vs. Tinba Banking Trojan
Tinba
2019-03-13Security Art WorkLab52
ORANGEWORM GROUP – KWAMPIRS ANALYSIS UPDATE
Kwampirs
2019-03-13ProofpointDennis Schwarz, Proofpoint Threat Insight Team
DanaBot control panel revealed
DanaBot
2019-03-13FlashpointJason Reaves, Joshua Platt
‘DMSniff’ POS Malware Actively Leveraged to Target Small-, Medium-Sized Businesses
DMSniff
2019-03-12MalwarebytesWilliam Tsing
The Advanced Persistent Threat files: Lazarus Group
Lazarus Group
2019-03-12CybereasonAssaf Dahan, Cybereason Nocturnus
New Ursnif Variant targets Japan packed with new Features
ISFB UrlZone
2019-03-12Palo Alto Networks Unit 42Unit 42
Operation Comando: How to Run a Cheap and Effective Credit Card Business
Operation Comando
2019-03-11ESET ResearchMarc-Etienne M.Léveillé
Gaming industry still in the scope of attackers in Asia
APT41
2019-03-11ThreatpostTara Seals
Researcher Claims Iranian APT Behind 6TB Data Heist at Citrix
IRIDIUM
2019-03-11PacktMelissa Dsouza
Resecurity reports ‘IRIDUIM’ behind Citrix data breach, 200+ government agencies, oil and gas companies, and technology companies also targeted.
IRIDIUM
2019-03-11MinervaMinerva Labs
Attackers Insert Themselves into the Email Conversation to Spread Malware
ISFB