Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-03-25Team CymruTeam Cymru
How the Iranian Cyber Security Agency Detects Emissary Panda Malware
HyperBro
2020-03-25Wilbur SecurityJW
Trickbot to Ryuk in Two Hours
Cobalt Strike Ryuk TrickBot
2020-03-20KrebsOnSecurityBrian Krebs
The Case for Limiting Your Browser Extensions
LNKR
2020-03-05SophosLabsSergei Shevchenko
Cloud Snooper Attack Bypasses AWS Security Measures
Cloud Snooper Ghost RAT
2020-03-05Kaspersky LabsAMR
Mokes and Buerak distributed under the guise of security certificates
Buer Mokes
2020-02-29Security AffairsPierluigi Paganini
Sodinokibi Ransomware gang threatens to disclose data from Kenneth Cole fashion firm
REvil
2020-02-28HornetsecurityHannah Kreyenberg
Mysterious spam campaign: A security analysis
2020-02-28Financial Security InstituteFinancial Security Institute
Profiling of TA505 Threat Group That Continues to Attack the Financial Sector
Amadey Clop FlawedAmmyy Rapid Ransom SDBbot TinyMet
2020-02-24Sophos LabsSergei Shevchenko
Cloud Snooper attack bypasses firewall security measures
Cloud Snooper
2020-02-12MeltX0R SecurityMeltX0R
Goblin Panda APT: Recent infrastructure and RAT analysis
NewCore RAT
2020-02-08PICUS SecuritySüleyman Özarslan
Emotet Technical Analysis - Part 2 PowerShell Unveiled
Emotet
2020-02-06SophosAndrew Brandt, Mark Loman
Living off another land: Ransomware borrows vulnerable driver to remove security software
RobinHood
2020-02-06SophosAndrew Brandt, Mark Loman
Living off another land: Ransomware borrows vulnerable driver to remove security software
RobinHood
2020-02-05SentinelOneVitali Kremez
Pro-Russian CyberSpy Gamaredon Intensifies Ukrainian Security Targeting
Pteranodon
2020-02-04Security-in-BitsSecurity-in-Bits
Similarity between Qealler/Pyrogenic variants -Part 0x3
Qealler
2020-01-31YouTube (Context Information Security)Contextis
New AVIVORE threat group – how they operate and managing the risk
PlugX
2020-01-30PICUS SecuritySüleyman Özarslan
Emotet Technical Analysis - Part 1 Reveal the Evil Code
Emotet
2020-01-29Bleeping ComputerLawrence Abrams
Malware Tries to Trump Security Software With POTUS Impeachment
TrickBot
2020-01-25Sanguine SecuritySanguine Labs
Indonesian Magecart hackers arrested
magecart
2020-01-21CrowdStrikeJohnny Shaw
Herpaderping: Security Risk or Unintended Behavior?