Click here to download all references as Bib-File.•
2019-05-07
⋅
SANS ISC InfoSec Forums
⋅
Vulnerable Apache Jenkins exploited in the wild kerberods |
2019-04-24
⋅
SpecterOps
⋅
Introducing Venator: A macOS tool for proactive detection AppleJeus WindTail |
2019-02-13
⋅
Accenture Security
⋅
SNAKEMACKEREL: Threat Campaign Likely Targeting NATO Members, Defense and Military Outlets APT28 |
2019-01-23
⋅
Bleeping Computer
⋅
New Anatova Ransomware Supports Modules for Extra Functionality Anatova Ransomware |
2019-01-22
⋅
McAfee
⋅
Happy New Year 2019! Anatova is here! Anatova Ransomware |
2019-01-18
⋅
Dell Secureworks
⋅
Understanding Command and Control - An Anatomy of xxmm Communication xxmm |
2019-01-01
⋅
Kaspersky Labs
⋅
Roaming Mantis: an Anatomy of a DNS Hijacking Campaign MoqHao Roaming Mantis |
2019-01-01
⋅
Kaspersky Labs
⋅
Roaming Mantis: an Anatomy of a DNS Hijacking Campaign MoqHao Roaming Mantis |
2019-01-01
⋅
Kaspersky Labs
⋅
Roaming Mantis: an Anatomy of a DNS Hijacking Campaign MoqHao Roaming Mantis |
2018-06-26
⋅
Cisco Talos
⋅
Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor Thanatos Ransomware |
2018-06-26
⋅
Cisco Talos
⋅
Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor Thanatos Ransomware |
2018-06-26
⋅
Cisco Talos
⋅
Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor Thanatos Ransomware |
2018-06-26
⋅
Bleeping Computer
⋅
Thanatos Ransomware Decryptor Released by the Cisco Talos Group Thanatos Ransomware |
2018-02-26
⋅
Opcode Security research
⋅
Anatomy of the Process Environment Block (PEB) (Windows Internals) |
2018-02-26
⋅
Bleeping Computer
⋅
Thanatos Ransomware Is First to Use Bitcoin Cash. Messes Up Encryption Thanatos Ransomware |
2018-01-16
⋅
Opcode Security research
⋅
Anatomy of the thread suspension mechanism in Windows (Windows Internals) |
2017-12-06
⋅
Botconf
⋅
Exploring a P2P Transient Botnet - From Discovery to Enumeration Rakos |
2017-09-26
⋅
ISC
⋅
XPCTRA Malware Steals Banking and Digital Wallet User's Credentials XPCTRA |
2017-08-29
⋅
InfoSec Handlers Diary Blog
⋅
Second Google Chrome Extension Banker Malware in Two Weeks IDKEY |
2017-07-03
⋅
The Guardian
⋅
'NotPetya' malware attacks could warrant retaliation, says Nato affiliated-researcher EternalPetya |
2017-06-16
⋅
FireEye
⋅
FIN10: Anatomy of a Cyber Extortion Operation FIN10 |
2016-03-10
⋅
Proofpoint
⋅
Death Comes Calling: Thanatos/Alphabot Trojan Hits the Market Thanatos |
2015-02-05
⋅
FireEye
⋅
Anatomy of a Brute Force Campaign: The Story of Hee Thai Limited XOR DDoS |
2015-02-05
⋅
FireEye
⋅
Anatomy of a Brute Force Campaign: The Story of Hee Thai Limited XOR DDoS |