Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-01-10U.S. Department of Justice
Phillip Durachinsky Indictment
FruitFly
2018-01-09Jacquais
BestKorea
BestKorea
2018-01-09Twitter (@struppigel)Karsten Hahn
Tweet on HiddenTear Sample
HiddenTear
2018-01-08Github (YSCHGroup)YSCHGroup
SkyRAT Powershell RAT
skyrat
2018-01-06CERT.PLPaweł Srokosz
Ostap malware analysis (Backswap dropper)
ostap
2018-01-04Carnegie Endowment for International PeaceCollin Anderson, Karim Sadjapour
Iran’s Cyber Ecosystem: Who Are the Threat Actors?
Magic Kitten
2018-01-03CyberbitHod Gavriel
New LockPoS Malware Injection Technique
LockPOS
2018-01-01Council on Foreign RelationsCyber Operations Tracker
APT 35
APT35
2018-01-01RiskIQBrandon Dixon
Alphathreat Soup Burning Actors with Data
2018-01-01MalpediaMalpedia
Family Description: KleptoParasite Stealer
KleptoParasite Stealer
2018-01-01Quick HealQuick Heal
The Complete story of EMOTET Most prominent Malware of 2018
Emotet
2018-01-01Accenture SecurityGareth Russell, Joshua Ray, Kelly Bissell, Ryan LaSalle, Uwe Kissman
LATEST CYBER ESPIONAGE MALWARE ATTACKS
LOTUS PANDA
2018-01-01fumik0 malware trackerfumik0
Entry on Rarog
Rarog
2018-01-01DarkMatterTaha K.
IN THE TRAILS OF WINDSHIFTAPT
WindTail WindShift
2018-01-01CrowdStrikeCrowdStrike
2018 Global Threat Report
Mangzamel BAMBOO SPIDER HOUND SPIDER ZOMBIE SPIDER
2018-01-01AvastAvast
Hide 'N Seek
Hide and Seek
2018-01-01Qihoo 360 TechnologyHui Wang, Ya Liu
Tracking Mirai variants (Appendix: Hashes)
Masuta
2018-01-01abuse.chabuse.ch
Feodo Tracker
Feodo
2018-01-01McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
Lazarus Group
2018-01-01Accenture SecurityAccenture Security
SNAKEMACKEREL - A BREXIT-themed lure document that delivers ZEKAPAB malware
APT28