Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-07-19ProofpointProofpoint Staff
TA505 Abusing SettingContent-ms within PDF files to Distribute FlawedAmmyy RAT
FlawedAmmyy
2018-07-18SymantecSecurity Response Attack Investigation Team
The Evolution of Emotet: From Banking Trojan to Threat Distributor
Emotet
2018-07-17IntrusiontruthIntrusiontruth
Who was behind this unprecedented Cyber attack on Western infrastructure?
2018-07-17Trend MicroJoey Chen
Blackgear Cyberespionage Campaign Resurfaces, Abuses Social Media for C&C Communication
Blackgear
2018-07-17ESET ResearchKaspars Osis
A deep dive down the Vermin RAThole
Quasar RAT Sobaken Vermin
2018-07-13Palo Alto Networks Unit 42Brittany Ash, Mike Harbison
Upatre Continued to Evolve with new Anti-Analysis Techniques
Upatre
2018-07-12360 Threat Intelligence360
Blue Pork Mushroom (APT-C-12) targeted attack technical details revealed
APT-C-12
2018-07-11FireEyeBen Read, Ben Wilson, Dan Perez, Marcin Siedlarz, Scott Henderson, Steve Miller
Chinese Espionage Group TEMP.Periscope Targets Cambodia Ahead of July 2018 Elections and Reveals Broad Operations Globally
AIRBREAK APT40
2018-07-11MicrosoftOffice 365 Threat Research
Hawkeye Keylogger – Reborn v8: An in-depth campaign analysis
HawkEye Keylogger
2018-07-10Carbon BlackJared Myers
Carbon Black TAU Threat Analysis: Recent Dharma Ransomware Highlights Attackers’ Continued Use of Open-Source Tools
Dharma
2018-07-10Kaspersky LabsGReAT
APT Trends Report Q2 2018
LightNeuron PoorWeb
2018-07-09RiskIQJordan Herman, Yonathan Klijnsma
Inside and Beyond Ticketmaster: The Many Breaches of Magecart
magecart
2018-07-09ESET ResearchAnton Cherepanov
Certificates stolen from Taiwanese tech‑companies misused in Plead malware campaign
PLEAD BlackTech
2018-07-08Check Point ResearchCheck Point Research
APT Attack In the Middle East: The Big Bang
Micropsia The Big Bang
2018-07-08FortinetJasper Manuel, Rommel Joven
Hussarini – Targeted Cyber Attack in the Philippines
Sarhust
2018-07-06Bleeping ComputerCatalin Cimpanu
HNS Evolves From IoT to Cross-Platform Botnet
Hide and Seek
2018-07-05National Critical Information Infrastructure Protection CentreNational Critical Information Infrastructure Protection Centre
NCIIPC Newsletter July 2018
Operation C-Major
2018-07-05Kaspersky LabsEgor Vasilenko, Orkhan Mamedov
To crypt, or to mine – that is the question
Rakhni
2018-07-05ZscalerDhanalakshmi
A Look At Recent Tinba Banking Trojan Variant
Tinba
2018-07-03CywareSamantha Black
Iranian APT Charming Kitten impersonates ClearSky, the security firm that uncovered its campaigns
Charming Kitten