Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-02-17Max Kersten's BlogMax Kersten
Following the tracks of MageCart 12
magecart
2020-02-16ClearSkyClearSky Research Team
Fox Kitten Campaign: Widespread Iranian Espionage-Offensive Campaign
SSHNET Fox Kitten
2020-02-16Check Point ResearchCheck Point Research
Hamas Android Malware On IDF Soldiers-This is How it Happened
Unidentified APK 004
2020-02-14US-CERTUS-CERT
Malware Analysis Report (AR20–045B): MAR-10265965-2.v1 - North Korean Trojan: SLICKSHOES
SLICKSHOES
2020-02-14US-CERTUS-CERT
Malware Analysis Report (AR20-045A): MAR-10265965-1.v1 - North Korean Trojan: BISTROMATH
BISTROMATH
2020-02-14US-CERTUS-CERT
Malware Analysis Report (AR20-045D): MAR-10271944-1.v1 - North Korean Trojan: HOTCROISSANT
HOTCROISSANT
2020-02-14US-CERTUS-CERT
Malware Analysis Report (AR20-045E): MAR-10271944-2.v1 - North Korean Trojan: ARTFULPIE
ARTFULPIE
2020-02-14US-CERTUS-CERT
Malware Analysis Report (AR20-045F): MAR-10271944-3.v1 - North Korean Trojan: BUFFETLINE
BUFFETLINE
2020-02-14US-CERTUS-CERT
Malware Analysis Report (AR20-045G): MAR-10135536-8.v4 - North Korean Trojan: HOPLIGHT
HOPLIGHT
2020-02-14Virus BulletinAditya K. Sood
LokiBot: dissecting the C&C panel deployments
Loki Password Stealer (PWS)
2020-02-13Palo Alto Networks Unit 42Brad Duncan
Wireshark Tutorial: Examining Qakbot Infections
QakBot
2020-02-13Quick HealGoutam Tripathy
A Deep Dive Into Wakeup On Lan (WoL) Implementation of Ryuk
Ryuk
2020-02-13Bleeping ComputerLawrence Abrams
Parallax RAT: Common Malware Payload After Hacker Forums Promotion
Parallax RAT
2020-02-13TalosEdmund Brumaghin, Nick Biasini
Threat actors attempt to capitalize on coronavirus outbreak
Emotet Nanocore RAT Parallax RAT
2020-02-13CybereasonCybereason Nocturnus
New Cyber Espionage Campaigns Targeting Palestinians - Part 2: The Discovery of the New, Mysterious Pierogi Backdoor
Pierogi
2020-02-13CybereasonCybereason Nocturnus
New Cyber Espionage Campaigns Targeting Palestinians - Part 1: The Spark Campaign
Spark
2020-02-12McAfeeChristiaan Beek
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part I
FriedEx
2020-02-12VMWare Carbon BlackAC, Rachel E. King
Ryuk Ransomware Technical Analysis
Ryuk
2020-02-11Github (jeFF0Falltrades)Jeff Archer
Metamorfo (aka Casbaneiro)
Metamorfo Unidentified 072 (Metamorfo Loader)
2020-02-10BitdefenderMichael Rosen
Hypervisor Introspection Thwarts Web Memory Corruption Attack in the Wild
coldbrew