Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-06-02MalwareNailedFaisal Abdul Malik Qureshi
PebbleDash - Lazarus / HiddenCobra RAT
PEBBLEDASH
2020-06-02Fox-ITNCC RIFT, Nikolaos Pantazopoulos, Stefano Antenucci
In-depth analysis of the new Team9 malware family
BazarBackdoor
2020-06-02Lastline LabsJames Haughom, Stefano Ortolani
Evolution of Excel 4.0 Macro Weaponization
Agent Tesla DanaBot ISFB TrickBot Zloader
2020-06-02Pwntario BlogAnton
Hunting Malicious Macros
2020-06-02NCC GroupNikolaos Pantazopoulos, Stefano Antenucci
In-depth analysis of the new Team9 malware family
BazarBackdoor
2020-06-01Twitter (@voodoodahl1)Matt Dahl
Tweet on malware called knspy used by Donot
KnSpy
2020-06-01Sophos LabsGabor Szappanos, Vikas Singh
THE INCREASINGLY COMPLEX KINGMINER BOTNET
Kingminer
2020-06-01AreteArete Incident Response
Sodinokibi / REvil Ransomware attacks against the Education Sector
REvil
2020-06-01Honeywell
USB Security-Myths vs. Reality
2020-06-01LookoutApurva Kumar, Christoph Hebeisen, Kristin Del Rosso
Mobile APT SurveillanceCampaigns Targeting Uyghurs A collection of long-running Android tooling connected to a Chinese mAPT actor
CarbonSteal DoubleAgent GoldenEagle SilkBean
2020-06-01Twitter (@ItsReallyNick)Nick Carr
Tweet on malware called NETFLASH
2020-06-01Seguranca InformaticaPedro Tavares
In-depth analysis of a trojan banker impacting Portugal and Brazil
2020-05-31Malwarebyteshasherezade
Revisiting the NSIS-based crypter
Formbook
2020-05-31Medium walmartglobaltechJason Reaves, Joshua Platt
WastedLoader or DridexLoader?
Dridex WastedLocker
2020-05-31ESET ResearchFacundo Muñoz
Ransomware Avaddon: principales características
Avaddon
2020-05-31The RecordCatalin Cimpanu
Russian hacker Pavel Sitnikov arrested for sharing malware source code
Anubis
2020-05-31Twitter (ShadowChasing1)Shadow Chaser Group
Tweet on DTRACK malware
Dtrack
2020-05-31InfoSec Handlers Diary BlogRenato Marinho
Guildma is now using Finger and Signed Binary Proxy Execution to evade defenses
Astaroth
2020-05-31KasperskyDavid Emm
IT threat evolution Q1 2021
2020-05-31Nullteilerfrei BlogLars Wallenborn
String Obfuscation in the Hamweq IRC-bot
Hamweq