Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-11-28RiskIQYonathan Klijnsma
Gaffe Reveals Full List of Targets in Spear Phishing Attack Using Cobalt Strike Against Financial Institutions
Cobalt
2017-11-28SentinelOneArnaud Abbati
OSX.CPUMEANER: New Cryptocurrency Mining Trojan Targets MacOS
CpuMeaner
2017-11-28CiscoJungsoo An, Paul Rascagnères, Warren Mercer
ROKRAT Reloaded
RokRAT
2017-11-25Kaspersky LabsAlexey Shulmin, Dmitry Karasovsky, Vasily Berdnikov
MICROCIN MALWARE: TECHNICAL DETAILS AND INDICATORS OF COMPROMISE
Microcin Vicious Panda
2017-11-24Bleeping ComputerCatalin Cimpanu
Mirai Activity Picks up Once More After Publication of PoC Exploit Code
Mirai
2017-11-22ReaqtaReaqta
A dive into MuddyWater APT targeting Middle-East
POWERSTATS
2017-11-22FlashpointVitali Kremez
Trickbot Gang Evolves, Incorporates Account Checking Into Hybrid Attack Model
TrickBot
2017-11-21bugarooOscar Juárez
New banking malware in Brazil - XPCTRA RAT ANALYSIS
XPCTRA
2017-11-20Palo Alto Networks Unit 42Anthony Kasza, Juan Cortes, Micah Yates
Operation Blockbuster Goes Mobile
HARDRAIN
2017-11-19Arab NewsELISE KNUTSEN
Iranian agents blackmailed BBC reporter with ‘naked photo’ threats
Charming Kitten
2017-11-16Github (mdsecactivebreach)Vincent Yiu
CACTUSTORCH: Payload Generation for Adversary Simulations
CACTUSTORCH
2017-11-14Palo Alto Networks Unit 42Tom Lancaster
Muddying the Water: Targeted Attacks in the Middle East
POWERSTATS MuddyWater
2017-11-14Department of Homeland SecurityDepartment of Homeland Security
HIDDEN COBRA – North Korean Remote Administration Tool: FALLCHILL
Lazarus Group
2017-11-13Obscurity LabsObscurity Labs
Match Made In The Shadows: Part [3]
PeddleCheap
2017-11-12MalwareBreakdown
Seamless Campaign Delivers Ramnit via RIG EK at 188.225.82.158. Follow-up Malware is AZORult Stealer.
Azorult
2017-11-09Bleeping ComputerCatalin Cimpanu
Ordinypt Ransomware Intentionally Destroys Files, Currently Targeting Germany
Ordinypt
2017-11-08ReaqtaReaqta
A short journey into DarkVNC attack chain
DarkVNC
2017-11-08Palo Alto Networks Unit 42Robert Falcone
OilRig Deploys “ALMA Communicator” – DNS Tunneling Trojan
Alma Communicator
2017-11-08SecurityIntelligenceGadi Ostrovsky, Limor Kessem
Overlay RAT Malware Uses AutoIt Scripting to Bypass Antivirus Detection
Overlay RAT
2017-11-07ThreatVectorCylance Threat Research Team
Locky Ransomware
Locky