Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-03-18MorphisecArnold Osipov
Parallax: The new RAT on the block
Parallax RAT
2020-03-18BitdefenderAlexandru Maximciuc, Cristina Vatamanu, Liviu Arsene, Radu Tudorica
New TrickBot Module Bruteforces RDP Connections, Targets Select Telecommunication Services in US and Hong Kong
TrickBot
2020-03-18RiskIQYonathan Klijnsma
Magecart Group 8 Blends into NutriBullet.com Adding To Their Growing List of Victims
magecart
2020-03-17Andrew Ivanov
ProLock Ransomware
2020-03-16MandiantKelli Vanderlee
They Come in the Night: Ransomware Deployment Trends
FAKEUPDATES
2020-03-16Medium Asuna AmawakaAsuna Amawaka
Shadows in the Rain
BBSRAT
2020-03-16ProofpointSherrod DeGrippo
TA505 and Others Launch New Coronavirus Campaigns; Now the Largest Collection of Attack Types in Years
RedLine Stealer
2020-03-15Twitter (@TheEnergyStory)Dominik Reichel
GuLoader anti analysis/sandbox tricks
CloudEyE
2020-03-15insomniacs(Medium)Asuna Amawaka
Dad! There’s A Rat In Here!
DADSTACHE
2020-03-14ID RansomwareAndrew Ivanov
RekenSom Ransomware
RekenSom
2020-03-12Recorded FutureInsikt Group
Swallowing the Snake’s Tail: Tracking Turla Infrastructure
TwoFace Mosquito
2020-03-12Amnesty InternationalAmnesty International
Targeted Surveillance Attacks in Uzbekistan: An Old Threat with New Techniques
Void Balaur
2020-03-12Check Point ResearchCheck Point
Vicious Panda: The COVID Campaign
8.t Dropper Vicious Panda
2020-03-12ID RansomwareAndrew Ivanov
Teslarvng Ransomware Yakuza Ransomware
Yakuza
2020-03-12Digital ShadowsAlex Guirakhoo
How cybercriminals are taking advantage of COVID-19: Scams, fraud, and misinformation
Emotet
2020-03-12Check PointCheck Point Research
Vicious Panda: The COVID Campaign
8.t Dropper BYEBY Enfal Korlia Poison Ivy
2020-03-12ESET ResearchMatthieu Faou
Tracking Turla: New backdoor delivered via Armenian watering holes
LightNeuron Mosquito NetFlash Skipper
2020-03-12Recorded FutureInsikt Group
Swallowing the Snake’s Tail: Tracking Turla Infrastructure
Mosquito Sinowal
2020-03-11Trend MicroFeike Hacquebord
Pawn Storm in 2019: A Year of Scanning and Credential Phishing on High-Profile Targets
2020-03-11Virus BulletinGhareeb Saad, Michael Raggi
Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers
8.t Dropper