Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-10-01SANS Cyber SummitAndrea Carcano
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems, Forever
Triton
2018-10-01ThreatFabricThreatFabric
BianLian - from rags to riches, the malware dropper that had a dream
BianLian
2018-10-01FireEyeAdrian Bataille, Matias Bevilacqua
Hunting for PLATINUM
REDSALT
2018-10-01Bleeping ComputerIonut Ilascu
Report Ties North Korean Attacks to New Malware, Linked by Word Macros
APT37
2018-10-01Palo Alto Networks Unit 42Josh Grunzweig
NOKKI Almost Ties the Knot with DOGCALL: Reaper Group Uses New Malware to Deploy RAT
Nokki
2018-09-27AvastThreat Intelligence Team
Torii botnet - Not another Mirai variant
Torii
2018-09-27SecureworksCounter Threat Unit ResearchTeam
Cybercriminals Increasingly Trying to Ensnare the Big Financial Fish
More_eggs Cobalt
2018-09-27Palo Alto Networks Unit 42Bryan Lee, Josh Grunzweig
New KONNI Malware attacking Eurasia and Southeast Asia
Nokki
2018-09-21ESET ResearchESET Research
DanaBot shifts its targeting to Europe, adds new features
DanaBot
2018-09-21SonicWallSonicWall CaptureLabs Threats Research Team
VIGILANTE MALWARE REMOVES CRYPTOMINERS FROM THE INFECTED DEVICE
FBot
2018-09-20SentinelOnePhil Stokes
On the Trail of OSX.FairyTale | Adware Playing at Malware
FailyTale
2018-09-19Möbius Strip Reverse EngineeringRolf Rolles
Hex-Rays Microcode API vs. Obfuscating Compiler
Ghost RAT
2018-09-18int 0xcc blogRaashid Bhat
A taste of our own medicine: How SmokeLoader is deceiving configuration extraction by using binary code as bait
SmokeLoader
2018-09-18Trend MicroJoseph C Chen
Magecart Skimming Attack Targets Mobile Users of Hotel Chain Booking Websites
magecart
2018-09-18The CitizenlabBahr Abdul Razzak, Bill Marczak, John Scott-Railton, Ron Deibert, Sarah McKune
Hide and Seek: Tracking NSO Group’s Pegasus Spyware to Operations in 45 Countries
Chrysaor
2018-09-17Palo Alto Networks Unit 42Claud Xiao, Cong Zheng, Xingyu Jin
Xbash Combines Botnet, Ransomware, Coinmining in Worm that Targets Linux and Windows
Xbash
2018-09-14CybereasonAmit Serper
Wannamine cryptominer that uses EternalBlue still active
WannaMine
2018-09-13FireEyeAyako Matsuda, Irshad Muhammad
APT10 Targeting Japanese Corporations Using Updated TTPs
APT10
2018-09-12Palo Alto Networks Unit 42Kyle Wilhoit, Robert Falcone
OilRig Uses Updated BONDUPDATER to Target Middle Eastern Government
OilRig
2018-09-12Palo Alto Networks Unit 42Kyle Wilhoit, Robert Falcone
OilRig Uses Updated BONDUPDATER to Target Middle Eastern Government
BONDUPDATER