Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-08-31SentinelOneJim Walter
The BLINDINGCAN RAT and Malicious North Korean Activity
BLINDINGCAN
2020-08-31NetlabGenShen Ye, Yanlong Ma, Ye Jin
In the wild QNAP NAS attacks
2020-08-31The DFIR ReportThe DFIR Report
NetWalker Ransomware in 1 Hour
Cobalt Strike Mailto MimiKatz
2020-08-31cyber.wtf blogLuca Ebach
Trickbot rdpscanDll – Transforming Candidate Credentials for Brute-Forcing RDP Servers
TrickBot
2020-08-31JPCERT/CCShusei Tomonaga
Malware used by the attack group Lazarus after network intrusion
2020-08-30Andrew Ivanov
Z3 Ransomware
Z3
2020-08-29AguinetAdrien Guinet
Emulating NotPetya bootloader with Miasm
EternalPetya
2020-08-28CYBERWISEAli Rıza Şahinkaya, Can Atakan Işık, Rıdvan Ethem Canavar
Cerberus Banking Trojan Analysis
Cerberus
2020-08-28NTTFumio Ozawa, Rintaro Koike, Shogo Hayashi
Operation Lagtime IT: Colourful Panda Footprint
Cotx RAT Poison Ivy TA428
2020-08-28McAfeeMcAfee
MVISION Insights: Wastedlocker Ransomware
WastedLocker
2020-08-28360 Core Security360威胁情报中心
The "sneak camera" in mobile pornography software
2020-08-28CheckpointCheck Point Research
Gozi: The Malware with a Thousand Faces
DreamBot ISFB LOLSnif SaiGon
2020-08-28White OpsSatori Threat Intelligence & Research team
TERRACOTTA Android Malware: A Technical Study
2020-08-28ProofpointAxel F, Proofpoint Threat Research Team
A Comprehensive Look at Emotet’s Summer 2020 Return
Emotet MUMMY SPIDER
2020-08-27fmnagisa wordpressFacundo M
Revisiting EquationGroup’s FANNY… or is it DEMENTIAWHEEL?
DoubleFantasy Fanny
2020-08-27Hatching.ioPete Cowman
Smokeloader Analysis and More Family Detections
SmokeLoader
2020-08-27Twitter (@MsftSecIntel)Microsoft Security Intelligence
Tweet on Anubis Stealer
Anubis
2020-08-27Palo Alto Networks Unit 42Aviv Sasson
Cetus: Cryptojacking Worm Targeting Docker Daemons
Cetus
2020-08-27ClearSkyClearSky Research Team
The Kittens Are Back in Town 3: Charming Kitten Campaign Evolved and Deploying Spear-Phishing link by WhatsApp
2020-08-27CheckpointAlex Ilgayev
An Old Bot’s Nasty New Tricks: Exploring Qbot’s Latest Attack Methods
QakBot