Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-02-03TelekomThomas Barabosch
Dissecting Emotet – Part 1
Emotet
2020-02-03DragosDragos
EKANS Ransomware and ICS Operations
Snake
2020-02-03Check Point ResearchYaroslav Harakhavik
Warzone: Behind the enemy lines
Ave Maria
2020-02-02ESET ResearchIgnacio Sanmillan, Marc-Etienne M.Léveillé
TLP: WHITE A WILD KOBALOS APPEARSTricksy Linux malware goes after HPCs
Kobalos
2020-02-02Sophos LabsMarkel Picado, Sean Gallagher
Agent Tesla amps up information stealing attacks
Agent Tesla
2020-02-02Nullteilerfrei BlogLars Wallenborn
Defeating Sodinokibi/REvil String-Obfuscation in Ghidra
REvil
2020-02-02uf0 BlogMatteo Malvica
Uncovering Mimikatz ‘msv’ and collecting credentials through PyKD
MimiKatz
2020-01-31YouTube (Context Information Security)Contextis
New AVIVORE threat group – how they operate and managing the risk
PlugX
2020-01-31AviraShahab Hamzeloofard
New wave of PlugX targets Hong Kong
PlugX
2020-01-31Virus BulletinMichal Poslušný, Peter Kálnai
Rich Headers: leveraging this mysterious artifact of the PE format
Dridex Exaramel Industroyer Neutrino RCS Sathurbot
2020-01-31TagesschauJan Lukas Strozyk
Deutsches Chemieunternehmen gehackt
Winnti
2020-01-31ESET ResearchMathieu Tartare
Winnti Group targeting universities in Hong Kong
ShadowPad Winnti
2020-01-30Certfa LabCertfa Lab
Fake Interview: The New Activity of Charming Kitten
Unidentified 073 (Charming Kitten)
2020-01-30IntezerMichael Kajiloti, Paul Litvak
New Iranian Campaign Tailored to US Companies Utilizes an Updated Toolset
TONEDEAF VALUEVAULT
2020-01-30Bleeping ComputerLawrence Abrams
TrickBot Uses a New Windows 10 UAC Bypass to Launch Quietly
TrickBot
2020-01-30MorphisecArnold Osipov
Trickbot Trojan Leveraging a New Windows 10 UAC Bypass
TrickBot
2020-01-30IBM X-Force ExchangeAshkan Vila, Golo Mühr
Coronavirus Goes Cyber With Emotet
Emotet
2020-01-30Under The BreachUnder The Breach
Tracking Down REvil’s “Lalartu” by utilizing multiple OSINT methods
REvil
2020-01-29Twitter (@ViriBack)Dee
Tweet on Borr
Borr
2020-01-28Macnica NetworksMacnica Networks
Tick ​​Group Aiming at Japanese Manufacturing
Datper xxmm