Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-05-29US-CERTUS-CERT
MAR-10135536-3 - HIDDEN COBRA RAT/Worm
Brambul Joanap
2018-05-25360360 Helios Team
Analysis of CVE-2018-8174 VBScript 0day and APT actor related to Office targeted attack
Retro
2018-05-25ESET ResearchMichal Poslušný
BackSwap malware finds innovative ways to empty bank accounts
BackSwap
2018-05-24Kaspersky LabsGReAT
VPNFilter EXIF to C2 mechanism analysed
VPNFilter
2018-05-23Cisco TalosCisco Talos
New VPNFilter malware targets at least 500K networking devices worldwide
VPNFilter
2018-05-23TencentTencent Mimi Threat Intelligence Center
SideWinder“响尾蛇”APT组织(T-APT-04):针对南亚的定向攻击威胁
SideWinder RAZOR TIGER
2018-05-23Department of JusticeOffice of Public Affairs
Justice Department Announces Actions to Disrupt Advanced Persistent Threat 28 Botnet of Infected Routers and Network Storage Devices
VPNFilter APT28
2018-05-21LACYoshihiro Ishikawa
Confirmed new attacks by APT attacker group menuPass (APT10)
Cobalt Strike
2018-05-18LookoutAndrew Blaich, Michael Flossman
Stealth Mango and Tangelo: Nation state mobile surveillanceware stealing data from military & government officials
Stealth Mango Stealth Mango and Tangelo
2018-05-17FidelisThreat Research Team
Gozi V3 Technical Update
ISFB
2018-05-17Minerva LabsGal Bitensky
Analyzing an AZORult Attack – Evasion in a Cloak of Multiple Layers
Azorult
2018-05-15TelefonicaTelefonica
N40, the botnet created in Brazil which evolves to attack the Chilean banking sector
N40
2018-05-15ReutersHugh Lawson, Niklas Pollard, Olof Swahnberg, Simon Johnson
Swedish sports body says anti-doping unit hit by hacking attack
APT28
2018-05-15Amnesty InternationalBrave
HUMAN RIGHTS UNDER SURVEILLANCE DIGITAL THREATS AGAINST HUMAN RIGHTS DEFENDERS IN PAKISTAN
StealthAgent Crimson RAT
2018-05-15Amnesty InternationalAmnesty International
PAKISTAN: HUMAN RIGHTS UNDER SURVEILLANCE
Operation C-Major
2018-05-11Think BigElevenPaths
New report: Malware attacks Chilean banks and bypasses SmartScreen, by exploiting DLL Hijacking within popular software
N40
2018-05-11SOC PrimeSOC Prime
Attackers Exploit DLL Hijacking to Bypass SmartScreen
N40
2018-05-08Security 0wnageMo Bustami
Clearing the MuddyWater - Analysis of new MuddyWater Samples
POWERSTATS
2018-05-08AP NewsRaphael Satter
Russian hackers posed as IS to threaten military wives
APT28
2018-05-08Bleeping ComputerCatalin Cimpanu
"Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots
Hide and Seek