Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-05-15Amnesty InternationalAmnesty International
PAKISTAN: HUMAN RIGHTS UNDER SURVEILLANCE
Operation C-Major
2018-05-11Think BigElevenPaths
New report: Malware attacks Chilean banks and bypasses SmartScreen, by exploiting DLL Hijacking within popular software
N40
2018-05-11SOC PrimeSOC Prime
Attackers Exploit DLL Hijacking to Bypass SmartScreen
N40
2018-05-08Security 0wnageMo Bustami
Clearing the MuddyWater - Analysis of new MuddyWater Samples
POWERSTATS
2018-05-08AP NewsRaphael Satter
Russian hackers posed as IS to threaten military wives
APT28
2018-05-08Bleeping ComputerCatalin Cimpanu
"Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots
Hide and Seek
2018-05-07BitdefenderBogdan Botezatu
Hide and Seek IoT Botnet resurfaces with new tricks, persistence
Hide and Seek
2018-05-07European Association for Secure TransactionsEuropean Association for Secure Transactions
EAST Publishes European Fraud Update 2-2018
WinPot
2018-05-03McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
concealment_troy http_troy Lazarus Group
2018-05-03Kaspersky LabsAlexey Firsh
WHO’S WHO IN THEZOO. CYBERESPIONAGE OPERATION TARGETS ANDROID USERS IN THE MIDDLE EAST.
ZooPark
2018-05-03ProtectWiseTom Hegel
Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers
APT41
2018-05-01Trend MicroRaphael Centeno
Legitimate Application AnyDesk Bundled with New Ransomware Variant
BlackRouter
2018-04-29Johannes Bader
The new Domain Generation Algorithm of Nymaim
Nymaim2
2018-04-27Virus BulletinMartijn Grooten
GravityRAT malware takes your system's temperature
Gravity RAT
2018-04-27Bleeping ComputerCatalin Cimpanu
North Korean Hackers Are up to No Good Again
Lazarus Group
2018-04-26Cisco TalosPaul Rascagnères, Warren Mercer
GravityRAT - The Two-Year Evolution Of An APT Targeting India
Gravity RAT
2018-04-24McAfeeRyan Sherstobitoff
Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide
GhostSecret
2018-04-24McAfeeAsheer Malhotra, Ryan Sherstobitoff
Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide
Lazarus Group
2018-04-24MalwarebytesThomas Reed
New Crossrider variant installs configuration profiles on Macs
Crossrider
2018-04-24ESET ResearchESET Research
Sednit update: Analysis of Zebrocy
Zebrocy Zebrocy (AutoIT)