Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-05-26Bleeping ComputerIonut Ilascu
New [F]Unicorn ransomware hits Italy via fake COVID-19 infection map
HiddenTear
2020-05-26CrowdStrikeGuillermo Taibo
Weaponized Disk Image Files: Analysis, Trends and Remediation
Nanocore RAT
2020-05-26Seguranca InformaticaPedro Tavares
The updated Grandoreiro Malware equipped with latenbot-C2 features in Q2 2020 now extended to Portuguese banks
Grandoreiro
2020-05-26ESET ResearchMatthieu Faou
From Agent.BTZ to ComRAT v4: A ten‑year journey (White Paper)
Agent.BTZ
2020-05-26ESET ResearchMatthieu Faou
From Agent.BTZ to ComRAT v4: A ten‑year journey
Agent.BTZ
2020-05-25Twitter (@JAMESWT_MHT)JamesWT
Tweet on FuckUnicorn instance of HiddenTear
HiddenTear
2020-05-25ElasticBrent Murphy, David French, Jamie Butler
The Elastic Guide to Threat Hunting
2020-05-25CERT-FRCERT-FR
INDICATEURS DE COMPROMISSION DU CERT-FR - Objet: Le code malveillant Dridex
Dridex
2020-05-25CERT-FRCERT-FR
Le Code Malveillant Dridex: Origines et Usages
Dridex
2020-05-25AhnLabAhnLab ASEC Analysis Team
Hangul malware distributed in real estate investment related emails (using EPS)
2020-05-24or10nlabsoR10n
Reverse Engineering the Mustang Panda PlugX Loader
PlugX
2020-05-24Palo Alto Networks Unit 42Ajaya Neupane, Stefan Achleitner
Using AI to Detect Malicious C2 Traffic
Emotet Sality
2020-05-24Positive TechnologiesPT ESC Threat Intelligence
Operation TA505: network infrastructure. Part 3.
AndroMut Buhtrap SmokeLoader
2020-05-24Nullteilerfrei BlogLars Wallenborn
Zloader String Obfuscation
Zloader
2020-05-24Malware and StuffAndreas Klopsch
Examining Smokeloader’s Anti Hooking technique
SmokeLoader
2020-05-23InfoSec Handlers Diary BlogXavier Mertens
AgentTesla Delivered via a Malicious PowerPoint Add-In
Agent Tesla
2020-05-23360 netlabJinye
New activity of DoubleGuns Group, control hundreds of thousands of bots via public cloud service
2020-05-23Australian Cyber Security CentreAustralian Cyber Security Centre (ACSC)
Summary of Tradecraft Trends for 2019-20: Tactics, Techniques and Procedures Used to Target Australian Networks
2020-05-22YoroiAntonio Pirozzi, Giacomo d'Onofrio, Luca Mella, Luigi Martire
Cyber-Criminal espionage Operation insists on Italian Manufacturing
Agent Tesla
2020-05-22Positive TechnologiesPT ESC Threat Intelligence
Operation TA505: investigating the ServHelper backdoor with NetSupport RAT. Part 2.
NetSupportManager RAT ServHelper