Click here to download all references as Bib-File.•
2019-07-08
⋅
Microsoft
⋅
Dismantling a fileless campaign: Microsoft Defender ATP’s Antivirus exposes Astaroth attack Astaroth |
2019-07-08
⋅
ESET Research
⋅
Malicious campaign targets South Korean users with backdoor‑laced torrents GoBotKR |
2019-07-01
⋅
HackMag
⋅
Crypto-Ransomware: Russian Style. Large-scale Research on Russian Ransomware Cryakl |
2019-07-01
⋅
Threat Vector
⋅
Threat Spotlight: Ratsnif - New Network Vermin from OceanLotus RatSnif |
2019-06-21
⋅
Network Security Research Lab @ Qihoo 360
⋅
An Analysis of Linux.Ngioweb Botnet Ngioweb |
2019-06-12
⋅
Cyberbit
⋅
Formbook Research Hints Large Data Theft Attack Brewing Formbook |
2019-06-11
⋅
Anomali
⋅
The InterPlanetary Storm: New Malware in Wild Using InterPlanetary File System’s (IPFS) p2p network IPStorm |
2019-06-10
⋅
Cylance
⋅
Threat Spotlight: MenuPass/QuasarRAT Backdoor DILLJUICE |
2019-06-04
⋅
Cylance
⋅
Threat Spotlight: Analyzing AZORult Infostealer Malware Azorult |
2019-05-29
⋅
ESET Research
⋅
A dive into Turla PowerShell usage PowerShellRunner TurlaRPC |
2019-05-28
⋅
Fortinet
⋅
Threat Research: New Rocke Variant Ready to Box Any Mining Challengers kerberods |
2019-05-22
⋅
ESET Research
⋅
A journey to Zebrocy land Zebrocy |
2019-05-14
⋅
Cylance
⋅
Reaver: Mapping Connections Between Disparate Chinese APT Groups Reaver Sparkle |
2019-05-14
⋅
ESET Research
⋅
Plead malware distributed via MitM attacks at router level, misusing ASUS WebStorage PLEAD BlackTech |
2019-05-07
⋅
ESET Research
⋅
Turla LightNeuron: An email too far LightNeuron |
2019-05-01
⋅
ESET Research
⋅
TURLA LIGHTNEURON: One email away from remote code execution LightNeuron |
2019-05-01
⋅
ClearSky
⋅
Iranian Nation-State APT Groups 'Black Box' Leak [Unnamed group] |
2019-04-30
⋅
ESET Research
⋅
Buhtrap backdoor and Buran ransomware distributed via major advertising platform Buhtrap ClipBanker RTM |
2019-04-24
⋅
Check Point Research
⋅
Deobfuscating APT32 Flow Graphs with Cutter and Radare2 Salgorea |
2019-04-19
⋅
Cylance
⋅
OceanLotus Steganography |