Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-01-14TelekomThomas Barabosch
Inside of CL0P’s ransomware operation
Clop Get2 SDBbot
2019-11-29DeloitteThomas Thomasen
Cyber Threat Intelligence & Incident Response
Cobalt Strike
2019-11-06Heise SecurityThomas Hungenberg
Emotet, Trickbot, Ryuk – ein explosiver Malware-Cocktail
Emotet Ryuk TrickBot
2019-10-17ESET ResearchMathieu Tartare, Matthieu Faou, Thomas Dupuy
OPERATION GHOST The Dukes aren’t back — they never left
FatDuke
2019-09-09McAfeeChintan Shah, Marc Rivero López, Thomas Roccia
Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study
Cutwail Dridex Dyre Kovter Locky Phorpiex Simda
2019-08-08MITRETimothy L. Thomas
Russian Military Thought: Concepts and Elements
2018-12-19McAfeeChristiaan Beek, Jessica Saavedra-Morales, Thomas Roccia
Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems
Filerase
2018-12-19Christiaan Beek, Jessica Saavedra-Morales, Thomas Roccia
Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems
OilRig
2018-12-07MalwarebytesThomas Reed
Mac malware combines EmPyre backdoor and XMRig miner
DarthMiner
2018-11-01CERT La PosteChristophe Rieunier, Thomas Dubier
Analyse du malware bancaire Gootkit et de ses mécanismes de protection
GootKit
2018-08-30ForbesThomas Brewster
Hackers Are Exposing An Apple Mac Weakness In Middle East Espionage
WindTail
2018-05-18NCC GroupNikolaos Pantazopoulos, Thomas Henry
Emissary Panda – A potential new malicious tool
HttpBrowser
2018-04-24MalwarebytesThomas Reed
New Crossrider variant installs configuration profiles on Macs
Crossrider
2018-03-02McAfeeAsheer Malhotra, Jessica Saavedra-Morales, Ryan Sherstobitoff, Thomas Roccia
McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups
Syscon
2018-03-01Kaspersky LabsCostin Raiu, Daniel Moore, Juan Andrés Guerrero-Saade, Thomas Rid
Penquin's Moonlit Maze
Penquin Turla
2018-02-12McAfeeAsheer Malhotra, Jessica Saavedra-Morales, Ryan Sherstobitoff, Thomas Roccia
Lazarus Resurfaces, Targets Global Banks and Bitcoin Users
CoreDN
2018-02-02MalwarebytesThomas Reed
New Mac cryptominer distributed via a MacUpdate hack
CreativeUpdater
2017-12-08MalwarebytesThomas Reed
Interesting disguise employed by new Mac malware HiddenLotus
HiddenLotus
2017-11-20MalwarebytesThomas Reed
OSX.Proton spreading through fake Symantec blog
Proton RAT
2017-07-27ForbesThomas Brewster
With Fake News And Femmes Fatales, Iran's Spies Learn To Love Facebook
Charming Kitten
2017-05-05MalwarebytesThomas Reed
Snake malware ported from Windows to Mac
Uroburos
2017-05-04ForbesThomas Brewster
Behind The Mystery Of Russia's 'Dyre' Hackers Who Stole Millions From American Business
Dyre
2017-05-01MalwarebytesThomas Reed
Another OSX.Dok dropper found installing new backdoor
Bella
2017-04-03Kaspersky LabsCostin Raiu, Daniel Moore, Juan Andrés Guerrero-Saade, Thomas Rid
Penquin’s Moonlit Maze
Penquin Turla
2017-04-03Kaspersky LabsCostin Raiu, Daniel Moore, Juan Andrés Guerrero-Saade, Thomas Rid
Moonlight Maze Technical Report (Appendix B)
Penquin Turla
2017-02-15ForbesThomas Brewster
Inside OilRig -- Tracking Iran's Busiest Hacker Crew On Its Global Rampage
OilRig
2017-01-18MalwarebytesThomas Reed
New Mac backdoor using antiquated code
FruitFly
2016-09-27MalwarebytesThomas Reed
Komplex Mac backdoor answers old questions
Komplex
2013-01-19SpamhausThomas Morrison
Cooperative Efforts To Shut Down Virut Botnet
Virut