Click here to download all references as Bib-File.•
2018-05-29
⋅
US-CERT
⋅
MAR-10135536-3 - HIDDEN COBRA RAT/Worm Brambul Joanap |
2018-05-25
⋅
360
⋅
Analysis of CVE-2018-8174 VBScript 0day and APT actor related to Office targeted attack Retro |
2018-05-25
⋅
ESET Research
⋅
BackSwap malware finds innovative ways to empty bank accounts BackSwap |
2018-05-24
⋅
Kaspersky Labs
⋅
VPNFilter EXIF to C2 mechanism analysed VPNFilter |
2018-05-23
⋅
Cisco Talos
⋅
New VPNFilter malware targets at least 500K networking devices worldwide VPNFilter |
2018-05-23
⋅
⋅
Tencent
⋅
SideWinder“响尾蛇”APT组织(T-APT-04):针对南亚的定向攻击威胁 SideWinder RAZOR TIGER |
2018-05-23
⋅
Department of Justice
⋅
Justice Department Announces Actions to Disrupt Advanced Persistent Threat 28 Botnet of Infected Routers and Network Storage Devices VPNFilter APT28 |
2018-05-21
⋅
⋅
LAC
⋅
Confirmed new attacks by APT attacker group menuPass (APT10) Cobalt Strike |
2018-05-18
⋅
Lookout
⋅
Stealth Mango and Tangelo: Nation state mobile surveillanceware stealing data from military & government officials Stealth Mango Stealth Mango and Tangelo |
2018-05-17
⋅
Fidelis
⋅
Gozi V3 Technical Update ISFB |
2018-05-17
⋅
Minerva Labs
⋅
Analyzing an AZORult Attack – Evasion in a Cloak of Multiple Layers Azorult |
2018-05-15
⋅
Telefonica
⋅
N40, the botnet created in Brazil which evolves to attack the Chilean banking sector N40 |
2018-05-15
⋅
Reuters
⋅
Swedish sports body says anti-doping unit hit by hacking attack APT28 |
2018-05-15
⋅
Amnesty International
⋅
HUMAN RIGHTS UNDER SURVEILLANCE DIGITAL THREATS AGAINST HUMAN RIGHTS DEFENDERS IN PAKISTAN StealthAgent Crimson RAT |
2018-05-15
⋅
Amnesty International
⋅
PAKISTAN: HUMAN RIGHTS UNDER SURVEILLANCE Operation C-Major |
2018-05-11
⋅
Think Big
⋅
New report: Malware attacks Chilean banks and bypasses SmartScreen, by exploiting DLL Hijacking within popular software N40 |
2018-05-11
⋅
SOC Prime
⋅
Attackers Exploit DLL Hijacking to Bypass SmartScreen N40 |
2018-05-08
⋅
Security 0wnage
⋅
Clearing the MuddyWater - Analysis of new MuddyWater Samples POWERSTATS |
2018-05-08
⋅
AP News
⋅
Russian hackers posed as IS to threaten military wives APT28 |
2018-05-08
⋅
Bleeping Computer
⋅
"Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots Hide and Seek |