Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-05-07SANS ISC InfoSec ForumsRenato
Vulnerable Apache Jenkins exploited in the wild
kerberods
2019-04-24SpecterOpsRichie Cyrus
Introducing Venator: A macOS tool for proactive detection
AppleJeus WindTail
2019-02-13Accenture SecurityAccenture Security
SNAKEMACKEREL: Threat Campaign Likely Targeting NATO Members, Defense and Military Outlets
APT28
2019-01-23Bleeping ComputerIonut Ilascu
New Anatova Ransomware Supports Modules for Extra Functionality
Anatova Ransomware
2019-01-22McAfeeAlexandre Mundo
Happy New Year 2019! Anatova is here!
Anatova Ransomware
2019-01-18Dell SecureworksYou Nakatsuru
Understanding Command and Control - An Anatomy of xxmm Communication
xxmm
2019-01-01Kaspersky LabsHiroaki Ogawa, Manabu Niseki, Suguru Ishimaru
Roaming Mantis: an Anatomy of a DNS Hijacking Campaign
MoqHao Roaming Mantis
2019-01-01Kaspersky LabsHiroaki Ogawa, Manabu Niseki, Suguru Ishimaru
Roaming Mantis: an Anatomy of a DNS Hijacking Campaign
MoqHao Roaming Mantis
2019-01-01Kaspersky LabsHiroaki Ogawa, Manabu Niseki, Suguru Ishimaru
Roaming Mantis: an Anatomy of a DNS Hijacking Campaign
MoqHao Roaming Mantis
2018-06-26Cisco TalosAndrew Williams, Earl Carter, Edmund Brumaghin
Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor
Thanatos Ransomware
2018-06-26Cisco TalosAndrew Williams, Earl Carter, Edmund Brumaghin
Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor
Thanatos Ransomware
2018-06-26Cisco TalosAndrew Williams, Earl Carter, Edmund Brumaghin
Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor
Thanatos Ransomware
2018-06-26Bleeping ComputerLawrence Abrams
Thanatos Ransomware Decryptor Released by the Cisco Talos Group
Thanatos Ransomware
2018-02-26Opcode Security researchntopcode
Anatomy of the Process Environment Block (PEB) (Windows Internals)
2018-02-26Bleeping ComputerLawrence Abrams
Thanatos Ransomware Is First to Use Bitcoin Cash. Messes Up Encryption
Thanatos Ransomware
2018-01-16Opcode Security researchntopcode
Anatomy of the thread suspension mechanism in Windows (Windows Internals)
2017-12-06BotconfRaimir Holanda, Renato Marinho
Exploring a P2P Transient Botnet - From Discovery to Enumeration
Rakos
2017-09-26ISCRenato Marinho
XPCTRA Malware Steals Banking and Digital Wallet User's Credentials
XPCTRA
2017-08-29InfoSec Handlers Diary BlogRenato Marinho
Second Google Chrome Extension Banker Malware in Two Weeks
IDKEY
2017-07-03The GuardianAlex Hern
'NotPetya' malware attacks could warrant retaliation, says Nato affiliated-researcher
EternalPetya
2017-06-16FireEyeFireEye
FIN10: Anatomy of a Cyber Extortion Operation
FIN10
2016-03-10ProofpointProofpoint Staff
Death Comes Calling: Thanatos/Alphabot Trojan Hits the Market
Thanatos
2015-02-05FireEyeDerek Gooley, Michael Lin
Anatomy of a Brute Force Campaign: The Story of Hee Thai Limited
XOR DDoS
2015-02-05FireEyeDerek Gooley, Michael Lin
Anatomy of a Brute Force Campaign: The Story of Hee Thai Limited
XOR DDoS