Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-07-17MalwarebytesThreat Intelligence Team
It’s baaaack: Public cyber enemy Emotet has returned
Emotet
2017-07-12CybereasonIsrael Barak
Operation Escalation: How click-fraud malware transforms into an advanced threat
Kovter
2017-07-12WiredLily Hay Newman
Iranian Hackers Have Been Infiltrating Critical Infrastructure Companies
OilRig
2017-07-12Kaspersky LabsSergey Yunakovsky
The Magala Trojan Clicker: A Hidden Advertising Threat
Magala
2017-07-12MalwarebytesMalwarebytes Labs
A .NET malware abusing legitimate ffmpeg
MobiRAT
2017-07-11G DataG Data
Ordinypt hat es auf Benutzer aus Deutschland abgesehen
Ordinypt
2017-07-11Trend MicroMarshall Chen, Rubio Wu
Spam Campaign Delivers Cross-platform Remote Access Trojan Adwind
AdWind
2017-07-11401 TRGNate Marx, Tom Hegel
Winnti (LEAD/APT17) Evolution - Going Open Source
2017-07-10Secrary BlogSecrary
Upatre - Trojan Downloader
Upatre
2017-07-08InfoSec Handlers Diary BlogXavier Mertens
A VBScript with Obfuscated Base64 Data
Revenge RAT
2017-07-05Seebug PaperADLab
Trump Zombies: New IoT Zombies Attacking 'In Trump's Name'
Trump Bot
2017-07-05Cisco TalosAleksandar Nikolic, David Maynor, Matt Olney, Yves Younan
The MeDoc Connection
TeleDoor
2017-07-05Trend MicroMobile Threat Response Team
SLocker Mobile Ransomware Starts Mimicking WannaCry
Slocker
2017-07-04Malware Traffic AnalysisBrad Duncan
MALSPAM WITH JAVA-BASED RAT
AdWind
2017-07-04McAfeeMcAfee
Important information about Night Dragon
Night Dragon
2017-07-03G DataG Data
Who is behind Petna?
EternalPetya
2017-07-03ESET ResearchAnton Cherepanov, Robert Lipovsky
BlackEnergy – what we really know about the notorious cyber attacks
BlackEnergy
2017-07-03The GuardianAlex Hern
'NotPetya' malware attacks could warrant retaliation, says Nato affiliated-researcher
EternalPetya
2017-07-01Secrary Bloglasha
Remcos RAT
Remcos
2017-07-01ClearSkyClearSky, Trend Micro
OperationWilted Tulip
Matryoshka RAT CopyKittens