Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-10-01Macnica NetworksMacnica Networks
Trends in cyber espionage (targeted attacks) targeting Japan | First half of 2018
Anel Cobalt Strike Datper FlawedAmmyy Quasar RAT RedLeaves taidoor Winnti xxmm
2018-10-01FireEyeKatie Nickels, Regina Elwell
ATT&CKing FIN7
Bateleur BELLHOP Griffon ANTAK POWERPIPE POWERSOURCE HALFBAKED BABYMETAL Carbanak Cobalt Strike DNSMessenger DRIFTPIN PILLOWMINT SocksBot
2018-10-01Youtube (FireEye Inc.)Christopher DiGiamo, Jacqueline O’Leary, Nalani Fraser
CDS 2018 | Unmasking APT X
NESTEGG
2018-10-01Bleeping ComputerIonut Ilascu
Report Ties North Korean Attacks to New Malware, Linked by Word Macros
APT37
2018-10-01Palo Alto Networks Unit 42Josh Grunzweig
NOKKI Almost Ties the Knot with DOGCALL: Reaper Group Uses New Malware to Deploy RAT
Nokki
2018-09-28CrowdStrikeAdam Meyers
Meet CrowdStrike’s Adversary of the Month for September: COBALT SPIDER
Cobalt
2018-09-27ESET ResearchESET Research
LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group
APT28
2018-09-27SecureworksCounter Threat Unit ResearchTeam
Cybercriminals Increasingly Trying to Ensnare the Big Financial Fish
More_eggs Cobalt
2018-09-27Bleeping ComputerIonut Ilascu
APT28 Uses LoJax, First UEFI Rootkit Seen in the Wild
APT28
2018-09-27Palo Alto Networks Unit 42Bryan Lee, Josh Grunzweig
New KONNI Malware attacking Eurasia and Southeast Asia
Nokki
2018-09-26CiscoEdmund Brumaghin
VPNFilter III: More Tools for the Swiss Army Knife of Malware
VPNFilter
2018-09-24Github (GhostPack)Will Schroeder
Github Repo for Rubeus
Rubeus
2018-09-20SentinelOnePhil Stokes
On the Trail of OSX.FairyTale | Adware Playing at Malware
FailyTale
2018-09-19Twitter (@LukasStefanko)Lukáš Štefanko
Tweet on Android Proxy Malware: Clientor
Clientor
2018-09-18MandiantManish Sardiwal, Muhammad Umair, Zain Gardezi
Fallout Exploit Kit Used in Malvertising Campaign to Deliver GandCrab Ransomware
Gandcrab
2018-09-18int 0xcc blogRaashid Bhat
A taste of our own medicine: How SmokeLoader is deceiving configuration extraction by using binary code as bait
SmokeLoader
2018-09-18Trend MicroJoseph C Chen
Magecart Skimming Attack Targets Mobile Users of Hotel Chain Booking Websites
magecart
2018-09-18CybereasonCybereason Nocturnus
VAI MALANDRA: A LOOK INTO THE LIFECYCLE OF BRAZILIAN FINANCIAL MALWARE: PART ONE
Overlay RAT
2018-09-18The CitizenlabBahr Abdul Razzak, Bill Marczak, John Scott-Railton, Ron Deibert, Sarah McKune
Hide and Seek: Tracking NSO Group’s Pegasus Spyware to Operations in 45 Countries
Chrysaor
2018-09-17Palo Alto Networks Unit 42Claud Xiao, Cong Zheng, Xingyu Jin
Xbash Combines Botnet, Ransomware, Coinmining in Worm that Targets Linux and Windows
Xbash